15.2 C
London
Monday, August 21, 2017
Home Tags Cyber

Tag: Cyber

The 2017 evolution of Gartner's cybersecurity framework comes with a new buzzword: CARTA.

But really, we should just set fire to everything.
Voter registration data belonging to the entirety of Chicagorsquo;s electoral rollmdash;1.8 million recordsmdash;was found a week ago in an Amazon Web Services bucket.
Despite yesterday's leak of the Apple iOS Secure Enclave decryption key, experts are urging calm over claims of an immediate threat to user data.
Mike Mimoso and Tom Spring discuss this week's security news, including a discussion on recent hijacking of popular Chrome extensions and Adobe's decision to end-of-life Flash Player.
A hacker identified only as xerub published the decryption key unlocking the iOS Secure Enclave Processor.
Cisco patched two high-severity vulnerabilities in its Cisco Application Policy Infrastructure Controller (APIC) that could allow an attacker to elevate privileges on the host machine.
A critical flaw in Drupal CMS platform could allow unwanted access to the platform allowing a third-party to view, create, update or delete entities.
At Black Hat USA, Matt Suiche, founder of Comae Technologies, describes what we know about the Shadow Brokers and how they have changed the business of cyber fear.
IBM researchers have demonstrated a filesystem-level version of the Rowhammer attack against MLC NAND flash memory.
Crowd Research Partners 2017 Threat Monitoring, Detection and Response Report reveals that many cyber-security professionals can find threats within a day, though it often takes much longer to recover.
Telstra is utilising its 'deep, deep skills in cyber' by launching security operations centres in Sydney, Melbourne, and across the globe, as well as likely upgrading its existing facility in Canberra.
Many fear being outed from photos, but now the real cyber game against "alt-right" begins.