Tag
#intel
Eight out of nine apps that people use to input Chinese characters into mobile devices have weakness that allow a passive eavesdropper to collect keystroke data.
Recent trends in breaches and attack methods offer a valuable road map to cybersecurity professionals tasked with detecting and preventing the next big thing.
Hackers can influence voters with media and breach campaigns, or try tampering with votes. Or they can combine these tactics to even greater effect.
Mobile malware-as-a-service operators are upping their game by automatically churning out hundreds of unique samples on a whim.
Plus, new details emerge on the Scattered Spider cybercrime network and ArcaneDoor.
Caliptra 1.0 offers a blueprint for integrating security features directly into microprocessors.
Cyberattacks on logistics are becoming increasingly common, and the potential impact is enormous.
Attacks by a previously unknown threat actor leveraged two bugs in firewall devices to install custom backdoors on several government networks globally.
How the CISO of Kenvue, a consumer healthcare company spun out from Johnson & Johnson, combined tools and new ideas to build out the security program.
Get updated advice on how, when, and where we should disclose cybersecurity incidents under the SEC's four-day rule after SolarWinds, and join the call to revamp the rule to remediate first.