DEF CON 2019: MacOS Gets a Malware Beatdown in Attack Demo
Patrick Wardle proves that signature-based anti-malware protection on Macs is woefully inadequate when fending off modern attacks.
Patrick Wardle proves that signature-based anti-malware protection on Macs is woefully inadequate when fending off modern attacks.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
It may seem scary to think about, but hackers are always finding new ways to access our personal data.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
As privacy regulations like GDPR and the California Consumer Privacy Act proliferate, more startups are looking to help companies comply. Enter Preclusio, a member of the Y Combinator Summer 2019 class, which has developed a machine learning-fueled solution to help companies adhere to these privacy regulations. “We have a platform that is deployed on-prem in…
Since the first use of electric lamps in the 19th century, society hasn’t looked back. Homes and streets are lit at all hours so that people can go about their business when they’d once have been asleep. Besides the obvious benefits to societies and the economy, there’s growing awareness of the negative impact of artificial…
Researchers show how they hacked Google Home smart speakers using the Megellan vulnerability.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Personalization is so often mentioned in the marketing industry, many business owners start feeling that they should be doing everything manually.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
If you can’t trust your bank, government or your medical provider to protect your data, what makes you think students are any safer? Turns out, according to one student security researcher, they’re not. Eighteen-year-old Bill Demirkapi, a recent high school graduate in Boston, Massachusetts, spent much of his latter school years with an eye on…
An engineering student in Illinois has put together a handy map to help pinpoint locations where police are tapped into Ring’s surveillance network. Ring, a company best known for smart doorbells and home security cameras, has a massive network of these cameras installed, some of which are being used for surveillance purposes by police in…
The bug exists in a controller that oversees HVAC, lighting, sensor and alarm systems, to name a few.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Solutions often meet us at intersections.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea