Dumb Privacy Rules

Dumb Privacy Rules: How Lawyers are Ruining It for Everyone

Father Guido Sarducci, comedian Don Novello’s eccumenical doppleganger, had a routine where he discussed the idea of the “5-minute University,” where he would teach you in five minutes everything you would remember ...
Security Boulevard
Dark Side Quantum Computing

New Foreshadow Vulnerabilities Defeat Memory Defenses on Intel CPUs

Security researchers have uncovered a new way to exploit the speculative execution feature of Intel CPUs to bypass memory security barriers and leak protected information. The vulnerability, known as Foreshadow or L1 ...
Security Boulevard
User Privacy Threatens Security Defenses

Lack of User Privacy Threatens Security Defenses

Data threats come from three general fronts: individuals sharing too much information, data breaches and corporations selling increasingly granular customer data. Security professionals frequently sound warnings for the first two. The last ...
Security Boulevard
Man-in-the-Disk Attack Lets Hackers Bypass Android App Sandbox Security

Man-in-the-Disk Attack Lets Hackers Bypass Android App Sandbox Security

Researchers have devised a new attack technique that takes advantage of how apps use the external storage of Android devices to store files to bypass security restrictions. Under the Android security model each ...
Security Boulevard
Cyber Kill Switch

Cyber Kill Switch: The Good, the Bad and the Potentially Ugly

When WannaCry struck, companies across the globe feared they would be next until an unsuspecting hero emerged, sink-holing the worm with a kill switch. Since then, security defenders across all sectors have ...
Security Boulevard
Industrial Control Gateways

Industrial Control Gateways: It’s Like Exploiting in the 1990s

Industrial control gateways play a critical role in industrial infrastructure, linking systems and sensors that communicate using protocols such as Modbus or serial to IP networks for easier remote management and monitoring ...
Security Boulevard
Security Boulevard’s 5 Most Read Stories for the Week

Security Boulevard’s 5 Most Read Stories for the Week, August 06-10

A new week, a new crop of security stories. Last week, U.S. Military ‘Reaper Drone’ Designs, Eavesdropping on mobile devices, Making security priority and Multifactor authentication adoption made the headlines. In addition, ...
Security Boulevard
China with GE’s Intellectual Property

Moonlighting in China with GE’s Intellectual Property

There seems to be a never-ending supply of stories about insiders who believe their company’s intellectual property is also their intellectual property. This month, we see Xiaoqing Zheng, 56-year-old naturalized U.S. citizen ...
Security Boulevard
Asian Dark Web Communities Thrive on Cultural Differences

Asian Dark Web Communities Thrive on Cultural Differences

A new report sheds light on the little-understood dark web markets in Asia, showing how they’re driven by cultural differences and local government policies. Researchers from IntSights Cyber Intelligence have investigated dark ...
Security Boulevard
5G Networks Security Challenge

Juniper Networks Rises to 5G Networks Security Challenge

Juniper Networks this week took the wraps off an acceleration card for its firewall designed to keep pace with the volume of traffic expect to be generated by 5G networks. Amy James, ...
Security Boulevard
Loading...