Security News




Zimperium researchers have unearthed three critical vulnerabilities in widely used software running on base transceiver stations (BTS), i.e. the equipment that makes cellphone towers work....

With the outsourcing of microchip design and fabrication a worldwide, $350 billion business, bad actors along the supply chain have many opportunities to install malicious circuitry in chips....




When is the best time to deliver a security message? A group of researchers from Brigham Young University has been tracking users’ neural activity while they are using a computer, and have...
