Security News
Attackers continue to use phishing as a preferred attack method, but have been forced to adapt their approach as anti-phishing tools and techniques are becoming more sophisticated. The phishing...
The number of supply chain attacks observed last year was 78% higher compared to the previous year, a new Symantec report reveals. read more
Some additional details have emerged about the recent security breach involving the PHP PEAR (PHP Extension and Application Repository) webserver, but much is still unknown. What happened? The...
Though the manufacturing sector does not attract the sheer volume of total cyberattacks as other areas of the economy, research has shown that coordinated cyber espionage targets manufacturing...
Experts sound off on how companies can work with their third-party suppliers and partners to secure the end-to-end supply chain.
Is it possible for attackers to equip integrated circuits with hardware Trojans that will not change the area or power consumption of the IC, making them thus indiscernible through power-based...
Back in October, Bloomberg reported that China has managed to install backdoors into server equipment that ended up in networks belonging to -- among others -- Apple and Amazon. Pretty much...
Privileged attacks will continue and Android will close open access, according to BeyondTrust's cybersecurity predictions for the new year.
Boston, MA-based start-up firm DUST Identity has emerged from stealth with $2.3 million seed funding led by Kleiner Perkins, with participation from New Science Ventures, Angular Ventures, and...
This is an interesting interview with a former NSA employee about supply chain security. I consider this to be an insurmountable problem right now....