Newsfeed Archive
News & Highlights
(Source: Help Net Security) “The attacker may potentially take advantage of remote software exploitation (for example, remotely controlling the multimedia software in a vehicle or personal device), deceive the user to play a
Read More
News & Highlights
(Source: BankInfoSecurity.com) The malware outbreak began on May 27, 2017, via “a very stealthy and cunning backdoor” added to source code of accountancy software called M.E. Doc, which is widely used
Read More
News & Highlights
(Source: StockNews.com) Reportedly, Intel simply isn’t doing enough on its own end to help patch its own security problems, and has been reluctant to take full responsibility for the debacle. Instead,
Read More
News & Highlights
(Source: satPRnews) The internet has become an integral part of modern life at every instant. It is convenient to share information, data, messages, applications, etc. over the internet. A
Read More
News & Highlights
(Source: Macworld) Last week Apple pushed out iOS 11.2.2, which seeks to mitigate the risks associated with the Spectre chip flaw via a security update to Safari and Webkit. Since a
Read More
News & Highlights
(Source: TechTarget) In addition, cybersecurity journalist Brian Krebs recently raised concern about a new strain of IoT attack malware called Reaper — also known as IoTroop — which spreads via security holes
Read More
News & Highlights
(Source: The Tri-County Press) The research report labeled Global Artificial Intelligence Software in Security Market 2017 presents the penetrating study of Artificial Intelligence Software in Securitymarket globally, concentrating on complete analysis of the present and past
Read More
News & Highlights
(Source: Defense One) These reports note that exploits may arise from inadvertently poor security design or from “the malicious insertion of defects or malware into microelectronics and embedded software, and
Read More
News & Highlights
(Source: Law.com) First, IoT presents interesting challenges for security and will certainly open up new challenges for discovery and forensics. Everyone knows the security risk is substantial. Just as the Target breach from 2014
Read More
News & Highlights
(Source: Help Net Security) Attackers are now building custom software tools designed to identify and compromise specific network and IoT connected medical devices. They know that medical devices are FDA approved
Read More