Security News & Reviews - Page 3
More Security News
Finding an organization's personally identifiable information that might be lurking on the Dark Web is a complex engineering challenge that Terbium Labs' Matchlight platform looks to solve.
NEWS ANALYSIS: Windows 7 users have 10 months to figure out what to do about their machines that haven’t been updated to Windows 10.
Trend Micro's Zero Day Initiative awarded $510,000 in cash prizes to researchers who demonstrated new zero-day vulnerabilities, and one team of researchers was even able to win a Tesla Model 3 after exploiting the vehicle's browser-based infotainment system.
Facebook inadvertently left hundreds of millions of usernames and passwords in clear text on its own internal servers. Apparently, the data was never leaked and the information was not abused.
The first day of the 2019 Pwn2Own hacking competition saw researchers awarded a total of $240,000 for demonstrating new zero-day exploits in Apple Safari, Oracle VirtualBox and VMware Workstation.
eWEEK DATA POINTS: Microsoft-related issues represented the majority of the top 10 most exploited vulnerabilities in 2018, according to a new report from Recorded Future, but that's not the only key insight included in the report about the state of the threat landscape.
Portworx Enterprise 2.1 adds new capabilities to its cloud-native Kubernetes data management platform, improving resilience and security.
TREND ANALYSIS: Now is the time for enterprises to start preparing for Quantum computing-powered security breaches. They will start happening.
Ahead of Pwn2Own, Mozilla released 21 security advisories for flaws that have now been fixed in the open-source web browser.
eWEEK DATA POINTS: Targeted phishing emails, commonly referred to as spear phishing, are a real risk for most organizations, as attackers use different techniques to lure victims.
The new tool aims to help IT pros collect and evaluate security analytics more easily across corporate hybrid cloud infrastructure.
eWEEK VIDEO: Rohit Ghai, president of RSA Security, outlines the intersection of identity, risk and trust and how his firm is bringing them together to improve security outcomes.