Security News > 2019 > February

Thunder, thunder, thunder... Thunderclap: Feel the magic, hear the roar, macOS, Windows pwnage tools are loose
2019-02-26 22:40

Open memory defenses allow mischief from connected kit Computers have enough trouble defending sensitive data in memory from prying eyes that you might think it would be unwise to provide...

You've got Thunderclap! iOS, Windows pwnage via peripherals is back in black
2019-02-26 22:40

Open memory defenses allow mischief from connected kit Computers have enough trouble defending sensitive data in memory from prying eyes that you might think it would be unwise to provide...

Up up and Huawei in my beautiful buffoon: Trump sparks panic by tying tech kit ban, charges to China trade negotiations
2019-02-26 22:05

National security, sanctions allegations, pfft, you don't understand the art of the deal Efforts to pressure the White House into banning Huawei hardware from America's networks may have backfired.…

Russia's Ex-Cybersecurity Chief Gets 22-Year Sentence in Jail
2019-02-26 21:59

A Russian military court convicted a former senior counterintelligence officer and a cybersecurity firm executive of treason Tuesday, concluding a case that initially aroused speculation of a...

Sen. Warner Demands Answers on Healthcare Cybersecurity
2019-02-26 21:18

Writes Letters to HHS, NIST, Industry Groups Posing Long Lists of QuestionsSenator Mark Warner, D-Va., has sent letters to four federal agencies and 12 healthcare associations posing long lists of...

Filling Vacant Cybersecurity Jobs: The Role of 'Reskilling'
2019-02-26 20:48

How can the many job openings for cybersecurity specialists be filled? "Reskilling" can play a critical role, says Greg Touhill, the nation's first federal CISO, who's now president of Cyxtera...

Why AI and ML are not cybersecurity solutions--yet
2019-02-26 20:13

AI and ML are often touted as silver bullets, but real-world applications for the technology seem thin on the ground.

Latest 4G, 5G phone-location slurp attack is a doozy, but won't Torpedo Average Joe or Jane
2019-02-26 19:34

Needs manpower, bags of time, full knowledge of target Analysis A group of infosec researchers have uncovered a neat way to track a phone's location via 4G or 5G. However, the mechanics of the...

New Attacks Show Signed PDF Documents Cannot Be Trusted
2019-02-26 18:48

Many popular PDF viewers and online validation services contain vulnerabilities that can be exploited to make unauthorized changes to signed PDF documents without invalidating their signature,...

‘Cloudborne’ IaaS Attack Allows Persistent Backdoors in the Cloud
2019-02-26 18:46

A known vulnerability combined with a weakness in bare-metal server reclamation opens the door to powerful, high-impact attacks.