The Latest in IT Security

1

Intel Security has released a tool that allows users to check if their computer’s low-level system firmware has been modified and contains unauthorized code. The release comes after CIA documents leaked Tuesday revealed that the agency has developed EFI (Extensible Firmware Interface) rootkits for Apple’s Macbooks. A rootkit is a malicious program that runs with […]

Read more ...

1

Computer users who have been affected by the Dharma ransomware and have held onto their encrypted files can now restore them for free. Researchers have created decryption tools for this ransomware strain after someone recently leaked the decryption keys. Dharma first appeared in November and is based on an older ransomware program known as Crysis. […]

Read more ...

1

Cisco is coming out with four next-generation firewall boxes aimed at giving smaller organizations protection that is better sized to their needs and engineered to minimize performance hits as additional security services are turned on

Read more ...

1

Every business needs to have a process in place for handling security vulnerability reports, but some organizations take a much more proactive approach to dealing with security researchers. An increasing number of hardware and software vendors have formal bug bounty programs. Google, for example, runs its own vulnerability rewards program, and Microsoft has multiple bug […]

Read more ...

Categories

FRIDAY, MARCH 24, 2017

Featured

Archives

Latest Comments

Social Networks