The flaw allows anyone who controls WhatsApp’s servers to effortlessly insert new people into an otherwise private group, even without…
Browsing: Data Protection
As ever: With Turla, nothing is quite what it seems. ESET researchers have found that Turla, the notorious state-sponsored cyberespionage…
George Santayana famously observed that: “Those who cannot remember the past are condemned to repeat it.” In a year where…
It has been reported this morning that the Winter Olympics has been targeted by hackers. Peter Carlisle, VP EMEA at Thales eSecurity commented…
Digital Defense, Inc., a leading security technology and services provider today announced that its Vulnerability Research Team (VRT) uncovered three…
Sources: – https://meltdownattack.com/ – https://www.wired.com/story/critical-intel-flaw-breaks-basic-security-for-most-computers/?mbid=email_onsiteshare Two vulnerabilities: – Meltdown o Description: Normally Intel x86 processors enforce memory separation between the Operating System (OS) kernel…
This past October felt as if someone had called open season on IoT devices. One of the biggest headlines surrounded…
James C. Foster, CEO at ZeroFOX, a social media security firm based in Baltimore, give his insight about social media next…
Everything is connected, every surface area is primed for data-capturing IoT, and life is mostly conducted from our phones. Even…
The Internet of Things (IoT) is a phrase we have been hearing a lot in 2017, with more and more…