Microsoft-Intel project converts malware into images to cut threats
Two industry giants are working to get a clearer picture of how to combat malware—literally.
May 12, 2020 report
0
142
Security
Two industry giants are working to get a clearer picture of how to combat malware—literally.
May 12, 2020 report
0
142
Security
What do you know about supply-chain attacks? In January, an article in CSO said it's when a weak link in your enterprise security might lie with partners and suppliers. It's when someone infiltrates your system through ...
May 5, 2019 weblog
1
65
Security
Security researchers said Tuesday they discovered flaws in chips made by Advanced Micro Devices that could allow hackers to take over computers and networks.
Mar 13, 2018
3
757
Security
People with cracked phone touch screens? What else is new? Many people drop their phones, shatter their screens and either put up with their cracked screens or run to shops for replacements. Now there is something to worry ...
Aug 23, 2017 weblog
2
201
Security
Cyber security researchers at Ben-Gurion University of the Negev (BGU) developed an innovative firewall program that adds a missing layer of security in Android cellphones and monitors for malicious code.
Jun 29, 2017
0
79
Security
Malicious websites promoting scams, distributing malware and collecting phished credentials pervade the web. As quickly as we block or blacklist them, criminals set up new domain names to support their activities. Now a research ...
Oct 27, 2016
0
383
Security
What can you do if the reason for your computer infection is so deep that malicious code cannot be detected even with the best antivirus scans? Firmware has become a notoriously great place for mischief, with malware planted ...
Jan 31, 2016 weblog
0
29