Security News
Vulnerable IPSec IKE implementations used in Cisco, Huawei, ZyXel and Clavister networking devices can allow attackers to retrieve session keys and decrypt connections, researchers have found. The...
The Vote Hacking Village invited attendees – including kids as young as six – to hack the voting infrastructure, including ballot machines, a voter database and more.
Yet another bluetooth hacking technique has been uncovered. A highly critical cryptographic vulnerability has been found affecting some Bluetooth implementations that could allow an...
DHS Agents Posed as Money Launderers, Helping Suspects Cash Out CryptocurrencyFederal authorities have arrested more than 35 suspects on charges that include selling illicit substances via darknet...
More and more malware authors are switching to buying new, valid code signing certificates issued by Certificate Authorities instead of using stolen (compromised) ones, researchers have found....
In April, at SecurityWeek’s ICS Cyber Security Conference in Singapore, industrial cybersecurity firm Applied Risk disclosed the details of a serious denial-of-service (DoS) vulnerability...
Most vendors probably don't intend to annoy CISOs, but it can happen anyway. Here are five behaviors to avoid.
Most vendors probably don't set out to annoy CISOs, but it happens anyway. Here are some behaviors to avoid.
Smaller businesses often don't have as much power to negotiate with cloud vendors, said Allianz's Jenny Soubra. This makes it even more important for SMBs to carefully consider vendor relationships.
No roadmap. No timeframe. No success metrics. Not much grip on reality, either ANALYSIS On Tuesday 34 technology companies revealed they’ve created and joined a “Cybersecurity Tech Accord” that...