Tag: Security Research
-
Finite State hires Larry Pesce as Product Security Research and Analysis Director
Finite State has hired Larry Pesce as its Product Security Research and Analysis Director. Pesce will serve as a senior consultant, …
-
Endpoints are a growing security problem, survey says
Nearly half of the endpoint devices corporations manage are at risk because they’re no longer on the IT organization’s radar or …
-
Amit Serper joins Sternum as Director of Security Research
Sternum welcomes Amit Serper, an international cybersecurity expert, as its new Director of Security Research. As a veteran cybersecurity …
-
Guardicore appoints Amit Serper as Area VP of Security Research
Guardicore announced that Amit Serper has joined the Guardicore Labs cyber research team as Area VP of Security Research for North America. …
-
Legality of Security Research to be Decided in US Supreme Court Case
Independent security researchers, digital-rights groups, and technology companies have issued friend-of-the-court briefs in a US Supreme …
-
Online Voting Startup Wants to Limit Some Security Research
Online Voting Startup Wants to Limit Some Security Research Voatz Files Amicus Brief In Case Headed to the US Supreme Court Akshaya Asokan …
-
Apple launches Security Research Device Program
Those who find one outside of an SRD are encouraged to share it through the Apple Security Bounty, which is offering rewards. Meanwhile, …
-
Apple Will Start Sending Special Devices to iPhone Hackers
It’s called the Security Research Device Program. Security researchers can apply for it starting today and Apple told Motherboard that if …
-
Known bugs and predictable phishing are behind your average security incident, IBM says
Lessons from the Equifax hack still haven’t spread far enough, it seems. In that case, Chinese military personnel allegedly exploited a …
-
A malicious Tor browser is helping scammers steal bitcoin, researchers say
Thieves are using malware that masquerades as Tor, the anonymizing internet browser, to steal money from Russian-speaking people on the …
-
‘StrongPity’ hacking group does just enough to get around defenses
Rather than expend resources on creating fancy new tools, malicious hackers often do the bare minimum needed to breach their targets. That …
-
Hidden Bee: Let’s go down the rabbit hole
Some time ago, we discussed the interesting malware, Hidden Bee. It is a Chinese miner, composed of userland components, as well as of a …
●●●