Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Privacy4Cars Secures Fourth Patent to Remove Privacy Information From Vehicles and Create Compliance Logs

Data-deletion service's patent covers removing personal information such as geolocation, biometrics, and phone records from a vehicle by using a user-computing device

DARKReading
Avatier Achieves ISO 27001 Certification for its Information Security Management System

Designation recognizes highest caliber of information security.

#ios#android#google#microsoft#perl#chrome
Quantum Cryptography Apocalypse: A Timeline and Action Plan

Quantum computing's a clear threat to encryption, and post-quantum crypto means adding new cryptography to hardware and software without being disruptive.

How APIs and Applications Can Live Happily Ever After

Solutions that allow businesses to reduce complexity, develop and deploy applications and APIs, and protect those applications and APIs are no fairy tale.

Why Cybersecurity Should Highlight Veteran-Hiring Programs

Military veterans tend to have the kind of skills that would make them effective cybersecurity professionals, but making the transition is not that easy.

Cybersecurity 'Nutrition' Labels Still a Work in Progress

Pretty much every aspect of the effort to create easy-to-understand labels for Internet-of-Things (IoT) products is up in the air, according to participants in the process.

Cookies for MFA Bypass Gain Traction Among Cyberattackers

Multifactor authentication has gained adoption among organizations as a way of improving security over passwords alone, but increasing theft of browser cookies undermines that security.

Knock, Knock: Aiphone Bug Allows Cyberattackers to Literally Open (Physical) Doors

The bug affects several Aiphone GT models using NFC technology and allows malicious actors to potentially gain access to sensitive facilities.

Uyghurs Targeted With Spyware, Courtesy of PRC

Chinese government employs spyware to detect so-called "pre-crimes" including using a VPN, religious apps, or WhatsApp, new analysis reveals.

Why CVE Management as a Primary Strategy Doesn't Work

With only about 15% of vulnerabilities actually exploitable, patching every vulnerability is not an effective use of time.