Security News & Reviews - Page 8
More Security News
Cloudflare is using the next generation Quic internet protocol and the open-source Wireguard VPN project as a base to build an advanced internet security service that could one day challenge incumbents in the multi-billion dollar enterprise VPN space.
NEWS ANALYSIS: Security researchers report that the Intel VISA chips can be exploited to expose information from signals that pass through the system boards of some computers.
Having the right access control in place for authorized systems and individuals is a critical part of any modern computing platform. When Cruise Automation didn't quite get the all the capabilities it needed from within the open-source Kubernetes project, it went out and built its own open-source...
SECURITY ANALYSIS: The ASUS supply chain attack known as ShadowHammer could have been found before it infected computers if security managers had known what to look for.
NEWS ANALYSIS: Overcoming enormous pre-show hurdles, asset management vendor Axonius won the RSA Conference 2019’s Innovation Sandbox. Duality’s collaboration platform rides homomorphic encryption to a second-place finish.
eWEEK DATA POINTS: According to the latest Norton LifeLock Cyber Safety Insights Report, Americans are worried about privacy but are still willing to accept risks.
NEWS ANALYSIS: Senior White House staff members are only the latest folks to confuse encrypted communications with something that’s safe.
Kaspersky Lab researchers disclose that the Asus Live Update tool was exploited, enabling attackers to deploy malware on end-user systems.
Finding an organization's personally identifiable information that might be lurking on the Dark Web is a complex engineering challenge that Terbium Labs' Matchlight platform looks to solve.
NEWS ANALYSIS: Windows 7 users have 10 months to figure out what to do about their machines that haven’t been updated to Windows 10.
Trend Micro's Zero Day Initiative awarded $510,000 in cash prizes to researchers who demonstrated new zero-day vulnerabilities, and one team of researchers was even able to win a Tesla Model 3 after exploiting the vehicle's browser-based infotainment system.