Sign up for our weekly newsletter!
REGISTER NOW
News & Views
Cover Image
Larry Loeb Author, | 11/16/2018
The class of CPU side-channel vulnerabilities dubbed Spectre and Meltdown arose suddenly in the early part of this year. These hardware flaws are the result of exception or branch misprediction events that can leave secret-dependent traces in the chip's microarchitectural state.
Cover Image
Larry Loeb Author, | 11/14/2018
For 74 minutes on Monday, November 12, traffic from Google's data centers was hijacked, essentially a de facto distributed denial-of-service attack.
Cover Image
Scott Ferguson Managing Editor, Light Reading, | 11/9/2018
In October, the US government issued a warning about a North Korean-backed cyber attack called "FASTCash," which targeted ATMs around the world. Now, Symantec has additional details about how the scheme worked and what tools the attackers used.
Cover Image
Scott Ferguson Managing Editor, Light Reading, | 11/8/2018
Global banking giant HSBC disclosed this week that the company's networks appeared to have been breached in October, with large amounts of customer data possible exposed and stolen.
Cover Image
Scott Ferguson Managing Editor, Light Reading, | 11/8/2018
A newly discovered botnet is able to infect up to 100,000 home routers at a time, in order to blast out spam by connecting to webmail servers that host Outlook, Hotmail and Yahoo email accounts, according to researchers.
Cover Image
Larry Loeb Author, | 11/5/2018
Armis, a security firm which has already found vulnerabilities with Bluetooth, has found two additional zero-day vulnerabilities that can affect 70% to 80% of businesses through Cisco, Meraki and Aruba wireless access points (APs), which are widely used by enterprises.
Cover Image
Larry Loeb Author, | 11/2/2018
In response to an increase in attacks that use Remote Desktop Protocol (RDP) as a starting point, Trend Micro has issued its own warning through a InfoSec Guide designed to increase awareness around this particular security issue.
Cover Image
Alan Zeichick Principal Analyst, Camden Associates, | 11/1/2018
If possession is nine-tenths of the law, then undetected physical access is nine-tenths of the way to a successful cyber attack.
Cover Image
Scott Ferguson Managing Editor, Light Reading, | 11/1/2018
The US Justice Department has charged a group of ten Chinese nationals for participating in an elaborate cyberespionage campaign that included infecting company computers with malware in order to steal plans and designs for a newly developed turbonfan engine.
discussion board
LarryLoeb
LarryLoeb, 11/16/2018 3:42:56 PM
New Spectre & Meltdown Attacks Show Limits of CPU Vulnerabilities
@Ariella That sounds like a plan to me.

Post Your Reply
Ariella
Ariella, 11/16/2018 2:47:32 PM
New Spectre & Meltdown Attacks Show Limits of CPU Vulnerabilities
@Larry I see. So we should just keep calm and keep vigilant without relaxing our guard.

Post Your Reply
LarryLoeb
LarryLoeb, 11/16/2018 1:10:42 PM
Google Data Center Traffic Rerouted to Nigeria, China & Russia
@Ariella Hey, I ain't no advanced peristent threat.....

Post Your Reply
Ariella
Ariella, 11/16/2018 11:56:13 AM
Google Data Center Traffic Rerouted to Nigeria, China & Russia
@LarryLoeb That's  a very apt image that explains it clearly.

Post Your Reply
Chat
Flash Poll
Video
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
Facebook has introduced new measures that will enable users to secure access to their accounts using a physical 'key' application.
All Videos
Sponsored Video
Sage Wagner, senior security pre-sales engineer with RiskSense, provides a demo of the company's latest technology 'RiskSense Solution,' a ...
Janus Technologies is launching a line of products that protect against the many threats to enterprises' sensitive data. David Schultz, vice ...
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity. Sponsored Video
All Videos
Radio Shows
Join editor Curt Franklin as he talks with Cricket Liu, head of DNS for Infoblox about the security implications of DNS -- one of the foundation services of the web.
like us on facebook
Security Now
About Us     Contact Us     Help     Register     Events     Supporting Partners     Twitter     Facebook     RSS
Copyright © 2018 Light Reading - an Informa business, trading within KNect365 US, Inc. All rights reserved. Privacy Policy | Cookie Policy | Terms of Use
in partnership with