The Latest in IT Security

Posts Tagged ‘Researchers’

#truecrypt may be a fond memory for most of its users, but that hasn’t stopped #researchers and hackers from poking about the open source encryption software. Recently, researchers from #google’s #project zero team uncovered a pair of elevation of privilege #vulnerabilities in TrueCrypt, both of which were patched this weekend in #veracrypt, one of the […]

Read more ...

#researchers recently discovered a smattering of #vulnerabilities in web applications and mobile applications belonging to companies like #yahoo, #paypal, #magento, and Shopify that could have led to account theft, session hijacking, and phishing, among other consequences. Hadji Samir, Ebrahim Hegazy, Ayoub Ait Elmokhtar, and Benjamin Kunz Mejri, researchers with Vulnerability Lab, found the bugs earlier […]

Read more ...

Breaking hypervisor isolation and attacking — or exploiting — neighboring virtual machines is a prominent goal of cyber criminals. At the Black Hat USA 2015 and DEF CON 23 conferences, a group of Intel Security researchers from the Advanced Threat Research team demonstrated that some hypervisors are vulnerable to attacks through system firmware launched from […]

Read more ...


Categories

TUESDAY, FEBRUARY 25, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments