The Latest in IT Security

Posts Tagged ‘vulnerabilities’

Oh goody! Erasing memories or rewriting them and then implanting false ones are not just the stuff of sci-fi or horror flicks, as a new report warns that hackers will be able to attack the memories of people with implanted brain stimulation devices. New research by Kaspersky Lab and the University of Oxford Functional Neurosurgery […]

Read more ...

Imagine the following scenario: a large financial institution has heard about recent breaches and thefts that have occurred around the world against similar institutions and wishes to protect itself. These questions may arise: Who is behind these attacks? What is the motive? What is the attack vector? What vulnerabilities were exploited? Is our environment secure […]

Read more ...

The number of reported Common Vulnerabilities and Exposures (CVE) is rapidly growing. In fact, more than 11,000 vulnerabilities have been reported so far this year. Common vulnerabilities are relatively easy for researchers and malicious actors to find, which is why we commonly see major breaches resulting from security issues that already have CVE numbers assigned […]

Read more ...

Categories

WEDNESDAY, NOVEMBER 14, 2018
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks