Zephyrnet Logo

Cyber Security

Using ‘Data for Good’ to Control the Pandemic

The tech community should unite to develop and distribute a universal COVID-19 contact-tracing application. Here's why and how.As governments around the world cope...

SANS Security Training Firm Hit with Data Breach

A phishing email allowed an attacker to compromise a SANS employee's email environment, the organization reports.Cybersecurity training firm SANS has confirmed a data...

How the Largest Data Recovery Company in Greece is Tackling Ransomware

Reading Time: 2 minutesRansomware is a dilemma that we have been facing for quite some time now. However, in 2020, we...

Threats vs. Thrift: Running Effective AppSec During a Global Crisis

By looking at security testing capacity, staff expertise, and risks throughout the software supply chain, application security teams can improve their overall effectiveness....

Kr00k, KRACK, and the Seams in Wi-Fi, IoT Encryption

Black Hat talk expands on research that uncovered more weaknesses in Wi-Fi chips allowing for the unauthorized decryption of traffic.Earlier this year, two...

Researchers Trick Facial-Recognition Systems

Goal was to see if computer-generated images that look like one person would get classified as another person.Neural networks powered by recent advances...

Microsoft Patches 120 Vulnerabilities, Two Zero-Days

The August 2020 Patch Tuesday marks the sixth month in a row Microsoft released patches for more than 110 vulnerabilities.Microsoft today released fixes...

Developers Need More Usable Static Code Scanners to Head Off Security Bugs

As companies "shift left" -- pushing more responsibility for security onto developers -- the tools that are available are falling short, usability researchers...

Symmetry Systems Emerges from Stealth

Enterprise VulnerabilitiesFrom DHS/US-CERT's National Vulnerability Database CVE-2020-7029PUBLISHED: 2020-08-11 A Cross-Site Request Forgery (CSRF) vulnerability was discovered in the System Management Interface Web component of...

Zoom Vulnerabilities Demonstrated in DEF CON Talk

A security researcher demonstrated multiple vulnerabilities, two of which could let an attacker read and steal user data.Zoom has patched multiple vulnerabilities discovered...

Is Edtech the Greatest APT?

Educational technology is critical but can come at huge costs to student and teacher privacy and security. Are those costs too high?High-value users...

EU-US Privacy Shield Dissolution: What Happens Next?

In a world that isn't private by design, security and liability implications for US-based cloud companies are huge.When the European Court of Justice...

Latest Intelligence

spot_img
spot_img