Security News & Reviews - Page 3

More Security News

Intel.logo

New Intel Chip Bug Can Expose All Data on a Computer to Hackers

|
NEWS ANALYSIS: Security researchers report that the Intel VISA chips can be exploited to expose information from signals that pass through the system boards of some computers.
Cruise Automation RBACSync

How GM's Cruise Autonomous Vehicle Effort Is Improving Kubernetes

|
Having the right access control in place for authorized systems and individuals is a critical part of any modern computing platform. When Cruise Automation didn't quite get the all the capabilities it needed from within the open-source Kubernetes project, it went out and built its own open-source...
ASUS.logo

How to Protect Your Enterprise PCs Against Fake Updates

|
SECURITY ANALYSIS: The ASUS supply chain attack known as ShadowHammer could have been found before it infected computers if security managers had known what to look for.
RSAC2019.winner.Axonius

RSAC 2019 Showcases Entrepreneurs Securing Our New World

|
NEWS ANALYSIS: Overcoming enormous pre-show hurdles, asset management vendor Axonius won the RSA Conference 2019’s Innovation Sandbox. Duality’s collaboration platform rides homomorphic encryption to a second-place finish.
 Norton LifeLock Cyber Safety Insights Report

American Consumers Distrust Social Media Privacy Capabilities

|
eWEEK DATA POINTS: According to the latest Norton LifeLock Cyber Safety Insights Report, Americans are worried about privacy but are still willing to accept risks.
Whatsapp.security

Why You Shouldn't Use Personal Messaging or Email Apps for Business

|
NEWS ANALYSIS: Senior White House staff members are only the latest folks to confuse encrypted communications with something that’s safe.
Supply Chain Malware 2

Asus Confirms Attack Against Update Tool That Exposed Users to Risk

|
Kaspersky Lab researchers disclose that the Asus Live Update tool was exploited, enabling attackers to deploy malware on end-user systems.
Apple Logo

Apple Secures iOS and macOS With New Updates

|
Apple's iOS 12.2 and macOS Mojave 10.14.4 updates provide a long list of fixes, including multiple patches for issues where a vulnerability could potentially enable an attacker to listen in on a user's device without user knowledge.
Terbium Labs

Terbium Labs Shines a Light on the Dark Web With Matchlight

|
Finding an organization's personally identifiable information that might be lurking on the Dark Web is a complex engineering challenge that Terbium Labs' Matchlight platform looks to solve.
Windows 10 migration

Microsoft Issues the Update to Announce the End of Windows 7 Updates

|
NEWS ANALYSIS: Windows 7 users have 10 months to figure out what to do about their machines that haven’t been updated to Windows 10.
Pwn2Own Tesla

Pwn2Own Researchers Exploit Mozilla Firefox, Microsoft Edge and Tesla

|
Trend Micro's Zero Day Initiative awarded $510,000 in cash prizes to researchers who demonstrated new zero-day vulnerabilities, and one team of researchers was even able to win a Tesla Model 3 after exploiting the vehicle's browser-based infotainment system.
Facebook Data Sharing Probe

Facebook Admits It Left Hundreds of Millions of User Passwords Exposed

|
Facebook inadvertently left hundreds of millions of usernames and passwords in clear text on its own internal servers. Apparently, the data was never leaked and the information was not abused.

Enterprise Tech Videos