brand trust

What’s Your Brand Promise? Customer Data, Cybersecurity, Compliance, And Trust

This article by Andre Bourque originally appeared in Benzinga. Portions are republished below. Dealing with data breaches is normal for big brands in the retail realm. You only need to scan the ...
How to Stop an Intel Foreshadow Bug Exploit Attack

How to Stop an Intel Foreshadow Bug Exploit Attack

Several execution vulnerabilities has been detected to affect Intel Processors. The vulnerabilities which were detected so far have been reported to be an execution type of flaws and were quickly named Foreshadow ...
Apple hacked by 16-year-old who “dreamed” of working for firm

Apple hacked by 16-year-old who “dreamed” of working for firm

An Australian teenager has admitted hacking into Apple’s internal network and stealing 90 GB worth of files. The 16-year-old, who cannot be named for legal reasons, has pleaded guilty to breaking into ...
Trickbot Banking Trojan August 2018 Updated with Stealth Code Injection

Trickbot Banking Trojan August 2018 Updated with Stealth Code Injection

The Trickbot banking Trojan has received an August 2018 update which adds a new code injection module. The infamous malware has remained active over the years as one of the most prominent ...

Speculation Attack Against Intel’s SGX

Another speculative-execution attack against Intel's SGX. At a high level, SGX is a new feature in modern Intel CPUs which allows computers to protect users' data even if the entire system falls ...
IoT, 5G Networks and Cybersecurity – Part 1: The Rise of 5G Networks

IoT, 5G Networks and Cybersecurity – Part 1: The Rise of 5G Networks

Smartphones today have more computing power than the computers that guided the Apollo 11 moon landing. From its original positioning of luxury, mobile devices have become a necessity in numerous societies across ...
Necurs Botnet Campaign Targets Banks with Malware .Pub Files

Necurs Botnet Campaign Targets Banks with Malware .Pub Files

The Necurs botnet is being used in a new attack campaign concentrating banks worldwide. The latest security reports indicate that the attackers utilize .PUB files which are Microsoft Publisher documents. Read our ...
Dark Side Quantum Computing

New Foreshadow Vulnerabilities Defeat Memory Defenses on Intel CPUs

Security researchers have uncovered a new way to exploit the speculative execution feature of Intel CPUs to bypass memory security barriers and leak protected information. The vulnerability, known as Foreshadow or L1 ...
Security Boulevard
CVE-2018-6177 Chrome Bug Allows Hackers to Steal Sensitive Data via HTML Tags

CVE-2018-6177 Chrome Bug Allows Hackers to Steal Sensitive Data via HTML Tags

A Chrome browser vulnerability known under the CVE-2018-6177 identifier, recently discovered by Imperva researcher Ron Masas, was just patched by Google. The security flaw could allow an attacker to retrieve sensitive data ...
™

6 most common cyber attacks

Cyber crime is at an all-time high. While organisations are trying to counter cyber attacks, criminal hackers are becoming more innovative and their attacks more sophisticated. What is a cyber attack? Cyber ...
Loading...