Read full post Currently the US government employs an inter-agency review, created under former President Barack Obama. Known as the Vulnerability Equities Process, it is tasked with deciding what happens to any cybersecurity flaws that is discovered by the National...
Read full post Neural fuzzing can help uncover bugs in software better than traditional tools, company says.
Read full post Some 40% of disclosed vulns as of Q3 are rated as severe, new Risk Based Security data shows.
Read full post Researchers claim Microsoft Word vulnerability CVE-2017-11881, patched today, has existed for 17 years.
Read full post The researchers’ conclusion? Password-based authentication is dead in the water
Read full post His gang exploited teenagers, prison inmates and serving US soldiers amongst others
Read full post Kernel USB drivers have turned out to be a rich hunting ground for Google researcher Andrey Konovalov
Read full post IT security teams may be in for a surprise about their mobile exposure as the GDPR compliance deadline approaches, according to a new survey.
Read full post Cybersecurity experts can learn how to do a better job by keeping a close eye on the gridiron.
Read full post “God only knows what it’s doing to our children’s brains”
Read full post Home and business security giant launches ADT Cybersecurity to offer managed detection and response (MDR) service.
Lenovo says AI crucial for enterprise as it announces new tech for training machine-learning systems
Read full post Lenovo releases new hardware and software for streamlining machine-learning on a high-performance computer systems.
Read full post What originally was supposed to be a tool to keep people using Samsung Pay, Samsung Rewards has continued to expand across more Samsung products.
Read full post Apps found in Google Play turned mobile devices into cryptocurrency miners unbeknownst to their users, according to researchers from security firm Ixia.
Read full post The high level of fear of cybercrime dovetails with the self-reported rates of victimization, as 25% of the respondents reported that their personal information or that of their household member has been stolen by hackers over the...
Read full post The more frequently you release apps, the more security vulnerabilities you are likely to introduce in the code, a new study confirms.
Read full post A rundown of some of the hottest security product areas, and vendors helping to shape them.
Read full post Deputy US Attorney General speaks out to support encryption backdoors
Read full post A common framework will help in the development of cyber-risk management efforts.
Read full post Unless companies processing citizens’ personal data fully understand the reasoning behind the decisions made based on their machine-learning models, they will find themselves between a rock and a hard place. The post Transparency of ML algorithms is...
Read full post The automatic filters are far from foolproof, so YouTube’s investigating other ways to take down the disturbing content.
Read full post This next major update, Quantum, is expected to include an option to turn on Tracking Protection during normal browsing
Read full post Here’s the latest episode of the Chet Chat podcast…enjoy.
Read full post The only people who should have access to your printer’s web interface are the people who need it
Read full post Changes to Google Chrome aim to prevent users from being redirected to unexpected websites and unwanted content.
Read full post Or, questions vendors need to ask themselves before they write a single word of marketing material.
Read full post The Cyber News Rundown brings you the latest happenings in cyber news weekly. Who am I? I’m Connor Madsen, a Webroot Threat Research Analyst, and a guy with a passion for all things security. Any more questions?...
Read full post Microsoft’s hardware spec could end up being a two-minute read with two-decade implications
Read full post These days, journalists and publishers are increasingly concerned about protecting themselves, their work, and their sources. Rightfully so, for we live in a time when nearly every aspect of publishing occurs online. The post Experts share perspective...