Texting or e-mail: Which gives you more secure communication?
WhatsApp, text or email—which is the most secure option when your conversation really has to be locked down?
Oct 14, 2019
1
4
Security
WhatsApp, text or email—which is the most secure option when your conversation really has to be locked down?
Oct 14, 2019
1
4
Security
Recent research indicates it's possible to infiltrate—and steal—vehicles manufactured by Toyota, Hyundai, and Kia due to flaws in the way their chip-enabled mechanical keys were encrypted.
Mar 7, 2020
0
152
Security
A bandit story of the cryptocurrency kind was a popular item on tech sites this week, with staggering amounts of money scooped up by some blockchain bandit, and spotted by security consultants, Independent Security Evaluators.
Hardware
Microsoft unveiled a new chip design Tuesday that it says will usher in a new era of security on Windows PCs.
Security
Organizations looking for and concerned about optimal security protection are the targets of a new service announced by San Francisco-based CloudFlare. The offering is called Keyless SSL. CloudFlare explained that "An SSL ...
Hardware
A pair of new security threats to Intel-based computer systems have been revealed. The beleaguered semiconductor chip manufacturer has faced a seemingly endless series of vulnerabilities over the past two years.
Computer Sciences
A team of researchers at Telecom ParisTech has developed a new method to protect encrypted data against key exposure. Their algorithm, presented in a paper pre-published on arXiv, transforms, fragments and disperses data ...
Hardware
Researchers at the Technical University of Berlin say they uncovered a new vulnerability in AMD's Trusted Platform Module (TPM). The flaw exposes firmware TPMs, or fTPMs, to attack.
Security
Worcester Polytechnic Institute (WPI) security researchers Berk Sunar and Daniel Moghimi led an international team of researchers that discovered serious security vulnerabilities in computer chips made by Intel Corp. and ...
Nov 12, 2019
0
507
Computer Sciences
Data-oriented attacks allow hackers to manipulate non-control data and alter a program's behavior, often causing significant damage to the systems affected. Researchers at Virginia Tech, Clemson University, Pennsylvania State ...