Hardware

Vulnerability found in Apple's T2 security chip

Security firm IronPeak has found a vulnerability in Apple's T2 security chip. They claim in a blog post that the vulnerability allows would-be hackers to gain root access to a wide variety of Apple computers.

Security

Helping companies prioritize their cybersecurity investments

One reason that cyberattacks have continued to grow in recent years is that we never actually learn all that much about how they happen. Companies fear that reporting attacks will tarnish their public image, and even those ...

Hardware

Reports: Intel chips have new security flaws

A pair of new security threats to Intel-based computer systems have been revealed. The beleaguered semiconductor chip manufacturer has faced a seemingly endless series of vulnerabilities over the past two years.

Security

Combination of techniques could improve security for IoT devices

A multi-pronged data analysis approach that can strengthen the security of Internet of Things (IoT) devices—such as smart TVs, home video cameras and baby monitors—against current risks and threats has created by a team ...

Security

One hack, 106 million people, Capital One ensnared by breach

A security breach at Capital One Financial, one of the nation's largest issuers of credit cards, compromised the personal information of about 106 million people, and in some cases the hacker obtained Social Security and ...

Computer Sciences

More efficient security for cloud-based machine learning

A novel encryption method devised by MIT researchers secures data used in online neural networks, without dramatically slowing their runtimes. This approach holds promise for using cloud-based neural networks for medical-image ...

page 4 from 26