News
Joining Graham Peck will be Isaac Moddel, VP Sales at Reflectiz, an expert in client-side security. Moddel will offer ...
The OpenSSL Corporation and the OpenSSL Foundation are issuing a final call for speaker proposals for the inaugural OpenSSL ...
Halo Security today announced that its attack surface management solution has been named a 2025 MSP Today Product of the Year ...
The researchers, John Jackson, an application security engineer for Shutter Stock, and the independent researcher known by the handle “Sick Codes,” said the flaws amount to a “back door” on any TCL ...
I hold the same belief and then some. Sort of like why do tablets all have a phone baseband etc built in even when they’re not mobile-data devices, or how impossible it will be soon to find a car that ...
A new study by the firm Interos found that many hardware components in a popular touchscreen voting machine used in the U.S. originate in China or Russia. Efforts by the federal government and ...
The acting head of the U.S. Department of Homeland Security said the agency was assessing the cyber risk of smart TVs sold by the Chinese electronics giant TCL, following reports last month in The ...
Author: Jeffrey Wheatman Jeffrey Wheatman is an author, researcher and strategic thought leader with extensive expertise in cybersecurity. In his role as Cyber Risk Evangelist at Black Kite, the ...
For one thing, agricultural production has become concentrated in a few hands – a risk the recent ransomware attack on meat processor JBS exposed. USDA data shows rapid consolidation in agriculture in ...
A presentation at the DEF CON conference in Las Vegas on Sunday highlighted cybersecurity holes that leave keyless electronic door locks vulnerable to getting picked – posing a serious risk to the ...
In this Spotlight episode of the Podcast, sponsored* by ForAllSecure we speak with CEO David Brumley about application “fuzzing” and how advancements in machine learning technology are allowing ...
More than 50 EAS deployments across the United States appear to still contain a vulnerability first discovered and reported by the firm IOActive in 2013, according to a warning posted by the security ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results