34C3: Hacking into a CPU’s Microcode

Inside every modern CPU since the Intel Pentium fdiv bug, assembly instructions aren’t a one-to-one mapping to what the CPU actually does. Inside the CPU,...

Lack of IT staff leaving companies exposed to hacker attacks | Technology

Cybersecurity professionals are calling for better education and improved apprentice schemes after saying a shortfall of staff in the sector is leaving companies exposed to hacker attacks. According to a recent survey of recruitment...

Happy IR in the New Year!

At the end of last year Mr. Jake Williams from aka @MalwareJake asked a very important question about Lack of visibility during detecting APT intrusions in twitter. Results show us that endpoint analysis...

What is Windows Hello? Microsoft’s biometrics security system explained

Windows Hello is a biometrics-based technology that enables Windows 10 users to authenticate secure access to their devices, apps, online services and networks with just a fingerprint, iris scan or facial recognition. The...

Leaky RootsWeb Server Exposes Some Ancestry.com User Data | Threatpost

CHM Help Files Deliver Brazilian Banking Trojan ...

Mozilla Patches Critical Bug in Thunderbird | Threatpost

CHM Help Files Deliver Brazilian Banking Trojan ...

Fidget Spinner Becomes a Brushless Motor; Remains Useless

Your grandmother means well. But by the time she figures out something’s a fad, it is old news. So maybe you got a...

Environmentally Aware Jewelry Gets Attention

We didn’t include a “Most Ornate” category in this year’s Coin Cell Challenge, but if we had, the environmentally reactive jewelry created by...

LATEST NEWS

MUST READ