Drone Swarms, North Korean Antivirus, and More Security News This Week

Credit to Author: Brian Barrett| Date: Sat, 05 May 2018 13:00:00 +0000
Bad drones, boobytrapped North Korean antivirus, and more of the week’s top security news.
Read MoreRSS Reader for Computer Security Articles

Credit to Author: Brian Barrett| Date: Sat, 05 May 2018 13:00:00 +0000
Bad drones, boobytrapped North Korean antivirus, and more of the week’s top security news.
Read More
Credit to Author: Lily Hay Newman| Date: Sat, 05 May 2018 11:00:00 +0000
Georgia’s SB315 discourages security research and encourages hacking back—meaning it’s exactly backwards.
Read More
Credit to Author: Lily Hay Newman| Date: Thu, 03 May 2018 21:30:21 +0000
On World Password Day, Twitter discloses a major gaffe that left user passwords potentially vulnerable.
Read MoreCredit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 04 May 2018 12:00:08 +0000

When I was little, I discovered the joy of jumping on the bed. While it was fun to jump on the bed, I wanted to make it more challenging so I started to imitate the ski jumpers I had seen during the 1976 Winter Olympics and jump from my parents’ dresser to the bed. I…
The post TippingPoint Threat Intelligence and Zero-Day Coverage – Week of April 30, 2018 appeared first on .
Read More
Credit to Author: Lily Hay Newman| Date: Thu, 03 May 2018 12:00:00 +0000
By fine-tuning social engineering techniques and targeting small businesses, Nigerian scammers have kept well ahead of defenses.
Read More
Credit to Author: Andy Greenberg| Date: Thu, 03 May 2018 10:00:00 +0000
Dutch researchers have pushed the mind-bending Rowhammer hacking technique one more step towards a practical attack.
Read MoreCredit to Author: Eva Chen| Date: Thu, 03 May 2018 16:24:23 +0000

At Trend Micro we’ve made it our business over the past 30 years to anticipate where technology is taking the world. That’s why our message has evolved over that time from Peace of Mind Computing to Your Internet Firewall and most recently Securing Your Journey to the Cloud. Well, we know that things are evolving…
The post Securing the Connected Industrial World with Trend Micro appeared first on .
Read MoreCredit to Author: Greg Young| Date: Thu, 03 May 2018 14:00:46 +0000

with contributing author, William J. Malik, CISA | VP, Infrastructure Strategies The date for General Data Protection Regulation (GDPR) compliance is three months away, yet many organizations, especially those outside Europe, remain unprepared. It turns out that the experiences from other privacy compliance regulations are less helpful than assumed, but the best lessons learned may be…
The post What HIPAA and Other Compliance Teaches Us About the Reality of GDPR appeared first on .
Read More