Security News & Reviews - Page 7
More Security News
DAILY VIDEO: A researcher discovers a hidden keylogger in an HP keyboard driver; Microsoft releases a free preview of its Quantum Development Kit; Microsoft is investing $50 million for AI-enabled environmental research; and there's more.
Three individuals plead guilty for their roles in Mirai cyber-attacks, as court documents provide new insight into how the IoT botnet operated.
New capabilities and products announced by Juniper at its NXTWORK event aim to make security simpler to deploy and automate.
eWEEK Staff | Updated
DAILY VIDEO: Newly revealed flaw in Intel processors allows undetectable malware; Google blocking Amazon Fire TV, Echo Show users from YouTube access; Apple Pay Cash allows person-to-person payments from Apple devices; and there's more.
NEWS ANALYSIS: Cyber-security threats will likely get worse next year as attacks get more sophisticated, but for organizations the focus will shift to loss prevention.
Memory corruption vulnerabilities in Microsoft's Edge browser are patched in the December Patch Tuesday update, as Microsoft provides new guidance to help improve security for Active Directory in the cloud.
Oracle continues to grow its machine learning cloud security capabilities with new services that help to automate and improve security.
Sean Michael Kerner | Updated
UPDATED: The Synaptics Touchpad driver which is widely used on HP laptops, included a keylogger, though it wasn't enabled by default.
The security startup continues to evolve its isolation technology to help protect organizations from emerging forms of malware.
NEWS ANALYSIS: Scammers are increasingly spoofing the Facebook user's account names to engage their friends in phony Messenger conversations to phish for personal information. Here's how to stop them.
The new macOS High Sierra 10.13.2 and iOS 11.2 updates patch multiple flaws across Apple's desktop and mobile operating systems.
UPDATED NEWS ANALYSIS: Intel’s Management Engine, which runs inside most recent Intel processors, can be hijacked by hackers, who can then gain unlimited access to everything on the device.