The Latest in IT Security

Posts Tagged ‘Researchers’

The #sha-1 #security standard, widely used in digital certificates, electronic banking, browsers, and other applications is weaker than previously thought and susceptible to attacks that are now well within the resources of criminal groups, an international team of cryptanalysts warned Thursday. Security #researchers had previously estimated that it would take at least another two years […]

Read more ...

#researchers took a big step towards eradicating the #angler exploit kit, disrupting a large #ransomware campaign connected to it that purportedly netted a hacker more than $30 million annually. According to a report published today, experts with #cisco’s Talos Security Intelligence and Research Group did a deep dive on the exploit kit over the summer […]

Read more ...

Regulatory agencies are trying to use copyright law to crack down on dangerous tampering with automobile computers, sparking fears that they will stymie needed cyber-#security research. As Internet-connected cars proliferate on the roads, so too do the opportunities for hackers to uncover and possibly exploit software security flaws — for good and bad. Concerns about […]

Read more ...


Categories

TUESDAY, FEBRUARY 25, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments