Security News
A newly discovered threat group shares similarities with three advanced persistent threats (APTs), Trend Micro security researchers have discovered. read more
The attack allows snooping of data from environments that are highly secure or air-gapped using infrared signals from smart bulbs.
With an OS design based on a verified microkernel, researchers contend almost all Linux OS flaws could be mitigated to less than critical severity.
The worldwide market for 3D-printed parts is a $5 billion business with a global supply chain involving the internet, email, and the cloud – creating a number of opportunities for counterfeiting...
Researchers have identified a number of online user tracking techniques that can’t be blocked by browsers’ built-in anti-tracking defenses and existing anti-tracking and ad-blocking extensions....
Virtually every desktop browser and adblocker can have its ad-tracking privacy or security bypassed by at least one software technique, a new study has found.
read more
The attack targets IKE’s handshake implementation used for IPsec-based VPN connections, opening the door for MiTM attacks or for bad actors to access data carried in VPN sessions.
IOActive’s researcher Ruben Santamarta is the sort of person anyone interested in computer security would probably enjoy sitting next to on a long flight. Take the journey he made last November...
read more