Cyber Security
Three years after the infamous Spectre vulnerability was discovered, hackers can still exploit the security flaw in order to force web browsers to leak...
Hi, what are you looking for?
Three years after the infamous Spectre vulnerability was discovered, hackers can still exploit the security flaw in order to force web browsers to leak...
The agencies’ guide on selecting a provider of protective DNS services is based on a pilot with the Department of Defense Cyber Crime Center....
They want the U.S. government to gain a better grasp of the rapidly emerging landscape of virtual currencies, smart contracts and other commodities. New...
A new online service allows security researchers to search for exposed shortened URLs, known for their risks to security and privacy. Shortened URLs are comparatively easy...
While cyberattacks targeting large corporations or government agencies tend to make splashy headlines, the truth is that many attackers are shifting their priorities to...
Since the recent boom in the prices of cryptocurrencies, cybercriminals are continuously targeting cryptocurrency platforms and exchanges, using a wide variety of attack tactics....
Attackers often keep upgrading their tools to scan for and infect new devices by exploiting unpatched vulnerabilities. Recently, the z0Miner cryptomining malware was spotted...
The marketplace was built as part of a recent Defense Department initiative aimed at advancing microelectronics technologies. IBM announced the establishment of a new...
The legislation would require companies to write their privacy policies in plain English. The House will soon consider legislation that would create the federal...
Like with any new agency initiative, nothing moves forward without executive sponsorship. Without question, 2020 was a very difficult year for all of us....