Security

Supply-chain hack attacks are worrying investigators

What do you know about supply-chain attacks? In January, an article in CSO said it's when a weak link in your enterprise security might lie with partners and suppliers. It's when someone infiltrates your system through ...

Security

Two security researchers find WPA3 vulnerabilities

You mean my safety blanket isn't safe? A next-gen standard "was supposed to make password cracking a thing of the past," clucked Ars Technica, after learning that vulnerabilities were found in the WPA3 protocol that could ...

Consumer & Gadgets

Google enables use of Android phones as a physical security key

Google has announced that it has made software updates to Chrome and Android that make it possible to use an Android phone (7+) as a physical security key. In their announcement, Google once again claimed that using physical ...

Business

France probes Apple over restricting smartphone repair

France is investigating US tech giant Apple over it allegedly planning for smartphones to become out of date through restricting their repair, prosecutors and an association said on Monday.

page 1 from 7