Security News
'Secure Data Act' Tries to End Long-Running Encryption StandoffA bipartisan group of U.S. lawmakers has reintroduced legislation in the House that would stop the government from forcing software...
A padding oracle vulnerability in Oracle Access Manager (CVE-2018-2879) can be exploited by attackers to bypass authentication and impersonate any user account. About the vulnerability The...
The blockchain sector is now bursting with innovation, with developers looking for new, pragmatic ways to use this secure distributed ledger technology across a range of applications. And as...
A remote code execution exploit supposedly stolen from the National Security Agency-linked Equation Group is currently being used by a new crypto-currency miner to spread to vulnerable Windows...
Lotus Notes man has a plan... and a patent Analysis Those who cannot remember the past are condemned to repeat it, particularly if forgetfulness promises profit.…
Ted Shorter of CSS on the Need to Update Cryptographic KeysWhat is crypto agility, and why is it so important to IoT? Ted Shorter of Certified Security Solutions offers an explanation.
Panel tackles the big stories of the year RSA 2018 Speaking at the 2018 RSA conference, a board of some of the most respected names in security spoke on Tuesday and were scathing about Facebook –...
RSA panel tackles the big stories of the year RSA 2018 Speaking at the 2018 RSA conference, a board of some of the most respected names in security spoke on Tuesday and were scathing about...
Cisco backs Isara's post-quantum PKI cert test in the hope it future-proofs TLS Cisco and quantum security outfit Isara reckon they've got at least as far as alpha stage in one a problem of the...
The volume of cryptomining transactions has been steadily growing since Coinhive came out with its browser-based cryptomining service in September 2017. Some websites have embraced the option and...