Security News & Reviews - Page 7

More Security News

iPhone security

10 Apps That Protect Users' iPhones and Safeguard Data SLIDESHOW

|
Because iPhone users aren't immune to attacks, security companies are aggressively building apps to protect the phone. Here are 10 of the best iPhone security apps available.
Google Ransomware

Google Tracks Ransomware Payments at Scale With Machine Learning

|
Researchers from Google, UCSD, NYU and Chainalysis analyzed the latest ransomware trends and explain why ransomware is not going away any time soon.
CableTap

CableTap Vulnerabilities Detailed at DefCon Expose ISP Gateway Risks

|
At the DefCon conference, security researchers detailed a set of 26 different vulnerabilities that impact millions of wireless gateways set up by internet service providers.
Ransomware payment chain

Black Hat, DefCon Expose Flaws in Voting Machines to Smart Guns SLIDESHOW

|
The pair of annual security conferences held in Las Vegas dig into the security of all manner of things, including—for the first time—voting machines.
Daily Tech Briefing July 31

BIOS Firmware Implementation Vulnerabilities Disclosed at Black Hat VIDEO

|
DAILY VIDEO: A researcher reveals BIOS firmware implementation flaws at Black Hat; antivirus software cloud use exposes customers to data exfiltration; Amazon Q2 earnings fall way short of Street projections; and there's more.
Cyber-Privacy Legislation

New U.S. Cyber-Security Legislation May Help Reassert Fourth Amendment

|
NEWS ANALYSIS: New federal legislation working its way through the Senate and House of Representatives could restrict the use of warrantless searches to seize personal data and communications stored on the nation's computers.
DEFCON voting village

Hackers Demonstrate Voting Machine Vulnerabilities at DefCon

|
At the DefCon 25 security conference, Voting Machine Village highlights the problems with modern election equipment and why it's a national security issue to fix the problem.
Aqua Security Black Hat

Aqua Security Reveals Developer Security Risks With Docker Containers

|
In a Black Hat session, researchers outline an attack scenario aimed against developers that could put them at risk of exploitation.
Longtermsecurity Black Hat

Details of Apple iCloud Keychain Flaw Emerge at Black Hat VIDEO

|
VIDEO: Alex Radocea, founder of Longterm Security, explains how he was able to intercept Apple iCloud Keychain with a vulnerability that could have exposed users to risk.
Crowdstrike

Vendors Use Black Hat Event to Launch New Products, Announce Advances SLIDESHOW

|
Gone are the days when Black Hat was just about research; now it's also a place where security vendors launch new products and make big announcements.
Bug bounty 2

Microsoft Offers up to $250,000 for Hyper-V Vulnerabilities

|
Microsoft is offering security researchers up to a quarter of a million dollars for security flaws in Windows Hyper-V virtualization.
Cloud Antivirus Breach

Antivirus Software Cloud Use Exposes Customers to Data Exfiltration

|
Research presented at Black Hat conference contends that at least four antivirus companies’ products use cloud sandboxes that could be exploited by malware to send out data undetected across the internet.

Enterprise Tech Videos