Security News > 2019 > February

Open memory defenses allow mischief from connected kit Computers have enough trouble defending sensitive data in memory from prying eyes that you might think it would be unwise to provide...

Open memory defenses allow mischief from connected kit Computers have enough trouble defending sensitive data in memory from prying eyes that you might think it would be unwise to provide...

National security, sanctions allegations, pfft, you don't understand the art of the deal Efforts to pressure the White House into banning Huawei hardware from America's networks may have backfired.…

A Russian military court convicted a former senior counterintelligence officer and a cybersecurity firm executive of treason Tuesday, concluding a case that initially aroused speculation of a...

Writes Letters to HHS, NIST, Industry Groups Posing Long Lists of QuestionsSenator Mark Warner, D-Va., has sent letters to four federal agencies and 12 healthcare associations posing long lists of...

How can the many job openings for cybersecurity specialists be filled? "Reskilling" can play a critical role, says Greg Touhill, the nation's first federal CISO, who's now president of Cyxtera...

AI and ML are often touted as silver bullets, but real-world applications for the technology seem thin on the ground.

Needs manpower, bags of time, full knowledge of target Analysis A group of infosec researchers have uncovered a neat way to track a phone's location via 4G or 5G. However, the mechanics of the...

Many popular PDF viewers and online validation services contain vulnerabilities that can be exploited to make unauthorized changes to signed PDF documents without invalidating their signature,...

A known vulnerability combined with a weakness in bare-metal server reclamation opens the door to powerful, high-impact attacks.