Security News > 2018 > April
Attackers have long shared their exploits, code, and methods, while defenders remained siloed. IBM Security created the X-Force Exchange platform as a way to share threat intelligence.
To deal with BYOD, insecure endpoints, and data leakage, many enterprises opted for MDM solutions-but they've turned out to be overbearing and ineffective.
Agency Seeks Congressional Authority to Require Makers to Take Certain StepsThe FDA has issued plans for advancing the safety of medical devices, including a proposal to impose new cybersecurity...
Having learned the lessons of the antivirus and malware wars on computers, ARM architected a secure hardware enclave that mobile devices have the option to tap into.
Poorly protected wetware could use the brain for protection Boffins from Belgium have tested the security of a wireless brain implant called a neurostimulator and found that its unprotected...
Researchers found a new iOS vulnerability called “trustjacking,” which exploits a feature called iTunes Wi-Fi Sync to give attackers persistent control over victims' devices.
A group of researchers from KU Leuven, Belgium, have proposed a practical security scheme that would allow secure communications between a widely used implantable neurostimulator – an electrical...
The case led to the CLOUD Act, which requires tech companies comply with court orders for data stored in the US and overseas.
Jackpotting Attacks Cost Banks Nearly $2 MillionFraudsters are now gingerly testing the waters in central and Western Europe with attacks that drain cash machines of their funds, according to a...
NTT Security's Khiro Mishra and Don Gray Discuss a New ApproachWhat is the "new science" of cybersecurity? Khiro Mishra and Don Gray of NTT Security describe the approach.