The Latest in IT Security

1

How can you be sure the “secure” USB drive you’re using is really secure and the data you store on it can’t be extracted? That’s exactly the question Google’s security researchers Ellie Bursztein, Jean-Michel Picod, and Rémi Audebert addressed in their talk, “Attacking encrypted USB keys the hard(ware) way,” at the recent Black Hat USA 2017.

Read more ...

1

Cisco fixed 15 vulnerabilities this week in more than a dozen products, including two high severity vulnerabilities that could have let an attacker trigger a denial of service condition or bypass local authentication. The more severe bugs fixed on Wednesday exist in the company’s Identity Services Engine and its Videoscape Distribution Suite. The bypass, which […]

Read more ...

1

The cybersecurity market has spawned a cottage industry of new industrial control systems (ICS) and industrial Internet of Things (IIoT) companies over the past few years. These pure-plays focus primarily or exclusively on cyber-defending power grids, nuclear power plants, Supervisory Control and Data Acquisition (SCADA) systems, operational technology (OT) infrastructures, and industries covering chemicals, manufacturing, […]

Read more ...

1

The recent WannaCry ransomware attacks on Windows systems have generated worldwide headlines and caused quite a lot of fear among users of all operating systems. Even some Mac users have been wondering if their computers are safe from such attacks. So are Mac users safe from ransomware attacks?

Read more ...

Categories

THURSDAY, AUGUST 24, 2017

Featured

Archives

Latest Comments

Social Networks