Security News
Here’s an overview of some of last week’s most interesting news and articles: Deception technology: Authenticity and why it matters An overview of the central role that authenticity plays in the...
Is it possible for attackers to equip integrated circuits with hardware Trojans that will not change the area or power consumption of the IC, making them thus indiscernible through power-based...
Mark Dreyfus offers to rubber-stamp legislation if only counter-terror agencies get decryption Mark Dreyfus, the Labor opposition's shadow Attorney General, has offered a compromise on Australia's...
The crafty malware has departed from its usual cornucopia of tactics and tricks.
David Stubley of 7 Elements Shares BEC Incident Response Lessons LearnedWant to better block business email compromise - CEO fraud - attacks outright, as well as be able to spot and respond more...
Poor DNS housekeeping opens the door to account takeover.
The bugs let hackers crash IoT devices, leak their information, and completely take them over.
Unknown attackers have compromised the official distribution of the VestaCP hosting control panel solution to harvest server IPs and admin credentials. That information was exploited to install...
What can organizations do to thwart business email compromise attacks? In an interview, David Stubley, CEO of the consultancy 7 Elements, outlines several key steps. He'll be a featured speaker at...
What if just receiving a video call on WhatsApp could hack your smartphone? This sounds filmy, but Google Project Zero security researcher Natalie Silvanovich found a critical vulnerability in...