How do enterprises figure out which security flaws to fix first? Research shows common vulnerability management and remediation strategies are no better than random guesses. Trying to predict which flaws will be exploited and fixing those is a better use of the security teams's time.
The White House plans to leave the cybersecurity coordinator job open, while lawmakers have introduced a bill to establish a new cybersecurity office.
The new Android Protected Confirmation API in Android P ensures that a human, not malware, is engaging with the app.
The Efail attacks on encrypted email clients implementing OpenPGP or S/MIME are serious, but there are mitigations and defenses available for users.
A new bill would prevent government agencies from mandating backdoors in encrypted hardware or software products.
Mikhail Davidov decided to see what it would take to develop a process to manually decapsulate chips. After months of work, experimentation, and trial and error, he succeeded.
The bill in Georgia that would have legalized active defense measures and outlawed some security research was vetoed by the state's governor.
Companies get away with disclosing just the bare minimum, or dribble out the bad news to the point where no one is paying attention. We need to hold companies to a higher set of expectations.
The Twitter password bug caused an uproar, but the company's handling of it shows the potential value of being transparent about security.
Protect the data at rest and in transit. How about while in use? Google’s open source framework Asylo helps developers use secure enclaves with their applications without having to know the specifics of how TEEs work or learning how to use specialized tools.
The National Institute of Standards and Technology (NIST) released its version 1.1 update to the 1.0 version of their Framework for Improving Critical Infrastructure Cybersecurity, last updated in 2014.
A team from a Dutch university have developed an attack that can remotely compromise some Android devices using the Rowhammer technique.
Mining Certificate Transparency logs can help uncover phishing sites using spoofed domain names, but it’s hard to do. Facebook has updated its Certificate Transparency Monitoring tool to notify website owners when their sites are being spoofed for malicious use.
Recent changes by Google to Google App Engine and Amazon to Amazon CloudFront has shut down domain fronting. App developers will have to consider other options if they want to disguise their app’s network traffic to evade network blocks and government censors.
The Georgia governor may soon sign a bill that would legalize active cybersecurity defense measures.