2 days ago 'This collaboration is absolutely critical going forward'... One positive thing about Meltdown CPU hole? At least it put aside tech rivalries...The Register View Synopsis+1
Execs, experts hope this cooperation continues to hold for the next big bug
A panel of eggheads from Intel, the US government, and academia held court this week to figure how they can keep the likes of El Reg from spoiling their next major bug reveal.…
Eleven organizations are asking major retailers in the United States to stop selling Internet-connected devices that don't meet minimum security and privacy requirements.
The latest edition of the ISMG Security Report highlights how thieves can use "deep fake" photos in an attempt to steal cryptocurrency. Also featured: A discussion of the implications of "data gravity" and an analysis of whether the era of mega-breaches is ending.
Eight Windows 10 apps removed from the Microsoft Store after getting caught mining Monero behind users' backs.
Despite a slight dip in the total number of breaches it was still a banner year for hackers focused on stealing data from websites, according to a Risk based Security report.
If you're worried about privacy on your personal or company-issued mobile device, these 10 apps can help protect your data.
As attack methodologies advance, tool-assisted detection is indispensable for security professionals to manage sprawling networks of devices that are not necessarily trustworthy.
A Rundown of the Conference's Top Emerging TopicsAnother annual HIMSS conference is in the rear-view mirror. But what's up the road in terms of top cybersecurity-related challenges facing the healthcare sector?
Hacker is selling 93 million user records from eight companies, including GfyCat.