Security

New CPU vulnerability extends to virtual machine environments

In the area of cloud computing—on-demand access to IT resources via the internet—so-called trusted execution environments (TEEs) play a major role. They are designed to ensure that the data on the virtual work environments ...

Security

Research offers novel approach for combating phishing attacks

Research in the International Journal of Electronic Security and Digital Forensics offers a new approach to combating phishing attacks in order to enhance online security and reduce cybercrime against individuals and businesses ...

page 2 from 16