How Can Businesses Defend Themselves Against Common Cyberthreats?
Today, all businesses are at risk of cyberattack, and that risk is constantly growing. Digital transformations are resulting in more...
Today, all businesses are at risk of cyberattack, and that risk is constantly growing. Digital transformations are resulting in more...
May 08, 2024NewsroomData Encryption / Hardware Security Researchers have discovered two novel attack methods targeting high-performance Intel CPUs that could...
Senetas has announced its largest-ever order for its encryption hardware, a substantial deal set to add between $2.5 and $3...
Several companies have already lined up to incorporate Horizon OS into their hardware: Lenovo, Asus, and Microsoft’s Xbox gaming business. ...
Google Cloud announced a new enterprise subscription for Chrome and a bevy of generative AI add-ons for Google Workspace during...
Operational Technology (OT) refers to the hardware and software used to change, monitor, or control the enterprise's physical devices, processes,...
It’s yet another hardware side-channel attack: The threat resides in the chips’ data memory-dependent prefetcher, a hardware optimization that predicts...
The newly exposed GoFetch vulnerability affecting Apple’s M1, M2 and M3 chips lets an attacker exfiltrate secret keys from cryptographic...
Yubico, the manufacturer of the phishing-resistant hardware authentication device, YubiKey, has highlighted how Microsoft's Surface Pro 10 for Business has...
The reassignment of existing equipment takes place when employees leave the organization or receive new computers, mobile devices, printers and...
A recent survey jointly conducted by Yubico, a provider of hardware authentication security keys, and Defending Digital Campaigns (DDC), a...
A new White House report focuses on securing computing at the root of cyber attacks — in this case, reducing...
State-sponsored hackers affiliated with China have targeted small office/home office routers in the U.S. in a wide-ranging botnet attack, Federal...
Operation Triangulation attacks relied on an undocumented hardware feature Pierluigi Paganini December 28, 2023 Experts discovered that Operation Triangulation targeting Apple...
Dec 28, 2023NewsroomSpyware / Hardware Security The Operation Triangulation spyware attacks targeting Apple iOS devices leveraged never-before-seen exploits that made...