A weakness in the Bluetooth pairing protocol in some Titan keys can leave them open to hijacking.
Dennis Fisher talks with Daniel Gruss of TU Graz about the Zombiload attack on Intel processors.
Like the earlier Meltdown and Spectre class of bugs, the new side-channel attacks ZombieLoad, RIDL, and Fallout take advantage of weaknesses in the processor's speculative execution feature to harvest secrets from system memory.
End-of-life doesn’t mean no longer a threat. Microsoft decided to release security updates for no longer supported Windows 2003 and Windows XP systems to fix a bug that could be exploited by a worm.
A WhatsApp vulnerability has reportedly been used in highly targeted attacks to install spyware on victims' phones.
Alex Pinto from Verizon Enterprise joins Dennis Fisher to break down the 2019 Data Breach Investigations Report.
The Verizon Data Breach Investigations Report isn’t just full of interesting data breach statistics; it also offers enterprise defenders valuable insights on the kind of real-world threats they should be worrying about.
Dennis Fisher, Zoe Lindsey, and Pete Baker wade into the jumbled mess of Swordfish and then emerge into the sunlight of Three Days of the Condor.
The FTC is urging Congress to pass a broad federal privacy and security law--and allow the commission to be the enforcement authority for it.
Google I/O is a good place to announce a whole lot of new privacy features “coming soon." It is also a good place to bury plans to change how Google will handle HTTP cookies in Chrome.
The FIN7 attack group is still alive and well, despite arrests of some alleged members and intense attention from researchers and law enforcement.
Michael Bailey of FireEye joins Dennis Fisher to discuss his analysis of the Carbanak backdoor source code.
While it’s intriguing that the Dark Web may be smaller than perceived, it was never the biggest threat to enterprises.
On paper, the executive order seems to have some good ideas on increasing the pool of talented security personnel for the federal IT workforce. Would DHS be able to deliver on these new programs?
The new MegaCortex ransomware is using stolen domain controller credentials to gain a foothold in corporate networks before spreading.