The Latest in IT Security

Posts Tagged ‘Exploit’

Today, analysts must either have advanced data science skills to build hunting algorithms that detect suspicious cyber behaviors or rely on blackbox vendor tools that package rigid algorithms. Sqrrl Enterprise 2.8 introduces the ability for analysts to easily create new hunting analytics without writing any code or having any data science skills.

Read more ...

Japanese electrical equipment company Fuji Electric has released an update for one of its human-machine interface (HMI) products to address several vulnerabilities. The affected product is the Fuji Electric Monitouch V-SFT, an application that allows organizations to configure their HMI screens. The software is used worldwide in the critical manufacturing and energy sectors.

Read more ...

Researchers have demonstrated that it’s possible to create synthetic DNA strands containing malicious computer code that, if sequenced and analyzed, could compromise a computer. The main goal of their research was to test open-source bioinformatics software commonly used by researchers to analyze DNA data for security flaws;

Read more ...

Categories

WEDNESDAY, AUGUST 23, 2017

Featured

Archives

Latest Comments

Social Networks