Mobile, Network security, Wireless security
April 11, 2019
Via: Help Net SecurityResearchers have discovered a number of design flaws affecting the security of the recently introduced WPA3 data transmission protocol. Collectively dubbed Dragonblood (because they affect WPA3’s Dragonfly handshake), they can be exploited to mount a DoS attack against a vulnerable […]
Application security, Cloud security
February 7, 2019
Via: Security IntelligenceMany organizations have such a positive first experience with cloud computing that they quickly want to move to a hybrid cloud environment with data and workloads shared between private and public clouds. The flexibility and control that a hybrid cloud […]
January 14, 2019
Via: Help Net SecurityThe advances made in technology throughout the past several decades have brought about an inevitable digital transformation, which companies are experiencing in today’s world. This transformation isn’t necessarily about the rise of new technology but, more so, about people’s desire […]
Network security, Privacy protection
August 6, 2018
Via: Security IntelligenceAmong the many requirements of the General Data Privacy Regulation (GDPR) is a directive to implement new systems of “privacy by design and default.” In this post-GDPR era, the practice may turn out to be more than a mandate. True […]
September 30, 2015
Via: hackerUntil a few years ago, only military organizations could afford #drones, but advances in sensors, micro-controllers and batteries have led to these aerial vehicles becoming available to consumers. These days, anyone can buy a quadcopter with a camera and have […]
March 12, 2015
Via: network-security#google #researchers have written the first-ever attack code that takes advantage of #electrical interference between densely packed memory cells, a unique style of attack that could require changes in #chip #design. The work builds on a paper published last year […]
April 11, 2024
March 21, 2024