Security News > 2020 > March

Nvidia's graphics processing unit display driver is used in devices targeted for enthusiast gamers; it's the software component that enables the device's operating system and programs to use its high-level graphics hardware. The most severe flaw exists in the control panel component of the graphics driver, which is a utility program helping users monitor and adjust the settings of their graphics adapter.

We are seeing phishing being threat number one, which leads to the human element here at this conference. Microsoft being the biggest target of phishing here in order to target companies and MSPs. There is an industrialization of what they are doing.

Vade Secure's Adrien Gendre explains why the end user is an important link in the security chain.


At the time of the breach, Ticketfly, which was owned and operated by Eventbrite, sold tickets to concerts and events at nightclubs throughout the U.S. Eventbrite reported that the Ticketfly accounts of about 27 million were compromised; they included personal information, such as names, email addresses, physical addresses and phone numbers, according to ZDNet. According to the federal indictment, Ishak allegedly damaged the company's website and then attempted to extort the company for money in May of 2018.

When entire regions are quarantined, home-bound people are overloading local switches, reducing international call quality and interrupting connectivity. This is having a measurable, negative impact on the audio quality of international calls and could be a harbinger of things to come.

Sameer Malhotra of TrueFort on Filling XDR Visibility GapsMoving from EDR to XDR creates new visibility gaps for organizations, says Sameer Malhotra of TrueFort, who explains a new approach to...

The RSA 2020 theme was "The Human Element." Gabriel Gumbs of Spirion describes what this means in the era of privacy regulations. What "The Human Element" means in the context of privacy;.

Although businesses are increasingly at risk for cyberattacks on their mobile devices, many aren't taking steps to protect smartphones and tablets. These companies were twice as likely to be compromised as those that didn't take precautions.

Cybersecurity firm Checkpoint has created an encyclopedia of the various techniques used by malware to evade analysis. The encyclopedia covers evasion techniques related to the file system, registry, generic OS queries, global OS objects, user interface artifacts, OS features, processes, network, CPU, firmware tables, hooks, hardware, and macOS-specific sandboxes.