Dark Side Quantum Computing

New Foreshadow Vulnerabilities Defeat Memory Defenses on Intel CPUs

Security researchers have uncovered a new way to exploit the speculative execution feature of Intel CPUs to bypass memory security barriers and leak protected information. The vulnerability, known as Foreshadow or L1 ...
Security Boulevard
Man-in-the-Disk Attack Lets Hackers Bypass Android App Sandbox Security

Man-in-the-Disk Attack Lets Hackers Bypass Android App Sandbox Security

Researchers have devised a new attack technique that takes advantage of how apps use the external storage of Android devices to store files to bypass security restrictions. Under the Android security model each ...
Security Boulevard
Security Boulevard’s 5 Most Read Stories for the Week

Security Boulevard’s 5 Most Read Stories for the Week, August 06-10

A new week, a new crop of security stories. Last week, U.S. Military ‘Reaper Drone’ Designs, Eavesdropping on mobile devices, Making security priority and Multifactor authentication adoption made the headlines. In addition, ...
Security Boulevard
Asian Dark Web Communities Thrive on Cultural Differences

Asian Dark Web Communities Thrive on Cultural Differences

A new report sheds light on the little-understood dark web markets in Asia, showing how they’re driven by cultural differences and local government policies. Researchers from IntSights Cyber Intelligence have investigated dark ...
Security Boulevard
5G Networks Security Challenge

Juniper Networks Rises to 5G Networks Security Challenge

Juniper Networks this week took the wraps off an acceleration card for its firewall designed to keep pace with the volume of traffic expect to be generated by 5G networks. Amy James, ...
Security Boulevard
New WPA2 Attack Can Compromise Wireless Networks

New WPA2 Attack Can Compromise Wireless Networks

Researchers have found a new and easier way of attacking wireless networks protected by the WPA2 security standard that could work against certain routers with roaming enabled. The new technique was discovered ...
Security Boulevard
Stealing Infrastructure Cryptomining Attacks

170K+ MikroTik Routers Inject Cryptomining Script

A hacker has managed to compromise more than 170,000 routers made by MikroTik and uses them to inject browser-based cryptomining scripts into legitimate websites visited by users. According to Simon Kenin, a ...
Security Boulevard
Iran-Linked RASPITE Group Targets U.S. Electric Utilities

Iran-Linked RASPITE Group Targets U.S. Electric Utilities

A known threat group believed to be based in Iran is trying to gain access to computer infrastructure belonging to U.S. electric utility organizations. The group, which researchers from industrial control systems ...
Security Boulevard
FireEye Infuses Machine Learning

FireEye Infuses Machine Learning into Endpoint Security

FireEye has become the latest provider of IT security technologies to incorporate machine learning algorithms into their portfolio. Unveiled this week, MalwareGuard adds a machine learning-based detection and prevention engine to FireEye ...
Security Boulevard
Supreme Court Ruling Changes

U.S. Charges 3 Members of the Notorious FIN7 Cybercriminal Group

The U.S. Department of Justice announced charges against three leading members of a cybercriminal group called FIN7 that hacked into more than 100 U.S. businesses. The three men are Ukrainian nationals and ...
Security Boulevard
Loading...