Apple has recently patched a Keychain vulnerability that could have been exploited by man-in-the-middle (MitM) attackers to obtain sensitive user information. The details of the flaw were disclosed on Monday by the researcher who reported it to the vendor....
SECURITYWEEK
READ MORE
|
Verizon Business is launching biometrics-backed Verizon Identity among three new security solutions added to its product portfolio to help companies fight cybercrime. The new cybersecurity offerings include Verizon Managed Detection and Response and Verizon Machine State Integrity, and the company has upgraded its Rapid Response Retainer service that provides cyber intelligence and incident response performance from the Verizon Threat Research Advisory Center (VTRAC), the company announced. Veri...
BIOMETRIC UPDATE
READ MORE
|
Two Iranian nationals have been charged by the US government for hacking a US defense technology maker in a bid to steal and sell software used in ammunition design. According to the US Department of Justice, Mohammed Reza Rezakah, 39, and others, hacked Arrow Tech, a Vermont-based engineering consulting and software company. Arrow Tech’s primary product was PRODAS, a piece of proprietary software that assists users in aerodynamics analysis and design for projectiles, from bullets to GPS g...
INFOSECURITY MAGAZINE
READ MORE
|
The government has launched a cyber security research scheme that brings together the expertise and resources of businesses, academia and government departments.GCHQ and the Department for Culture, Media and Sport are behind the project, which aims to help businesses benefit from expertise the of GCHQ, the Engineering and Physical Sciences Research Council (EPSRC) and academics....
COMPUTER WEEKLY
READ MORE
|
NATIONAL HARBOR: Matthew Broderick in his basement, playing Wargames over a landline, is still the pop culture archetype of a hacker. But as wireless networks became the norm, new-age cyber warfare and traditional electronic warfare are starting to merge. Hackers can move out of the basement to the sky....
BREAKINGDEFENSE
READ MORE
|
U.S. Cyber Command’s effort to build a force of 6,200 cyber warriors, split among 133 operational teams, has fueled a tug-of-war between the Defense Department’s active and reserve components....
NAVYTIMES
READ MORE
|