In the ever-evolving world of malware, rootkits are some of the most dangerous threats out there. Story on eSecurity Planet
Month: November 2022
What is confidential computing?
Today’s tech industry needs to always keep a step ahead of attackers. Confidential computing is a part of that conversation… Story on TechRepublic
Lenovo driver goof poses security risk for users of 25 notebook models
More than two dozen Lenovo notebook models are vulnerable to malicious hacks that disable the UEFI secure boot process… Story on Ars Technica
Microsoft’s Certificate-Based Authentication Enables Phishing-Resistant MFA
Microsoft has removed a key obstacle facing organizations seeking to deploy phishing-resistant multifactor authentication (MFA) by enabling certificate-based authentication. Story on Dark Reading
How Does DNS Telemetry Help Detect and Stop Threats?
Question: How can administrators use DNS telemetry to complement NetFlow data in detecting and stopping threats? Story on Dark Reading
Unencrypted Traffic Still Undermining Wi-Fi Security
Even cybersecurity professionals need to improve their security posture. That’s the lesson from the RSA Conference in February… Story on Dark Reading
Using Wi-FI to See through Walls
Using Wi-FI to See through Walls This technique measures device response time to determine distance. Story on Schneier on Security
Password-hacking attacks are on the rise. Here’s how to stop your accounts from being stolen
Stolen accounts lead to so many other woes. Story on ZDNet
1Password CEO: Our Competition Isn’t Just Apple and Google, It’s Bad Habits
Bad habits are so difficult to overcome. Story on PCMag
6 ways to reduce your IoT attack surface
If you must be involved in IoT, then do some basic things to reduce the target on your devices. Story on TechRepublic