Spectre vulnerability: 4 years after discovery
Does hardware vulnerabilities in CPU pose a practical threat to businesses?
53 articles
Does hardware vulnerabilities in CPU pose a practical threat to businesses?
What’s in Google’s report on typical attacks against cloud systems in Google Cloud Platform?
A cyberattack has affected an unexpectedly large number of industrial systems.
Researchers from Cambridge describe the Trojan Source method for inserting hidden implants in source code.
Employees can install proxyware without their employer’s knowledge, introducing additional business cyberrisks.
In the wake of recent research, we talk about several scenarios that underlie malicious activity on Discord.
A recent study shows that even “clean” Android smartphones collect a lot of information about their owners.
Just like many other modern devices, seemingly “dumb” feature phones are much smarter than you might think. And this may be a problem.
At DEF CON 29, a researcher explained why agricultural machinery should be considered critical infrastructure and demonstrated vulnerabilities in the main manufacturers’ equipment.
Apple plans to use its new CSAM Detection system to monitor users and identify those who store child pornography on their devices.