Security News & Reviews - Page 5
More Security News
SECURITY ANALYSIS: The ASUS supply chain attack known as ShadowHammer could have been found before it infected computers if security managers had known what to look for.
NEWS ANALYSIS: Overcoming enormous pre-show hurdles, asset management vendor Axonius won the RSA Conference 2019’s Innovation Sandbox. Duality’s collaboration platform rides homomorphic encryption to a second-place finish.
eWEEK DATA POINTS: According to the latest Norton LifeLock Cyber Safety Insights Report, Americans are worried about privacy but are still willing to accept risks.
NEWS ANALYSIS: Senior White House staff members are only the latest folks to confuse encrypted communications with something that’s safe.
Kaspersky Lab researchers disclose that the Asus Live Update tool was exploited, enabling attackers to deploy malware on end-user systems.
Finding an organization's personally identifiable information that might be lurking on the Dark Web is a complex engineering challenge that Terbium Labs' Matchlight platform looks to solve.
NEWS ANALYSIS: Windows 7 users have 10 months to figure out what to do about their machines that haven’t been updated to Windows 10.
Trend Micro's Zero Day Initiative awarded $510,000 in cash prizes to researchers who demonstrated new zero-day vulnerabilities, and one team of researchers was even able to win a Tesla Model 3 after exploiting the vehicle's browser-based infotainment system.
Facebook inadvertently left hundreds of millions of usernames and passwords in clear text on its own internal servers. Apparently, the data was never leaked and the information was not abused.
The first day of the 2019 Pwn2Own hacking competition saw researchers awarded a total of $240,000 for demonstrating new zero-day exploits in Apple Safari, Oracle VirtualBox and VMware Workstation.
eWEEK DATA POINTS: Microsoft-related issues represented the majority of the top 10 most exploited vulnerabilities in 2018, according to a new report from Recorded Future, but that's not the only key insight included in the report about the state of the threat landscape.