Intel launch in pictures
19 Jan | View galleries
By replacing a PC's SPI flash chip with one that contains rogue code, an attacker can can gain full, persistent access.
Chip makers release patches but they'll customers will need to choose between security and performance.
Intel dials back Spectre patching after weighing up benefits.
AMD claims it's patches will have no impact on CPU performance, distinguishing the bugs from the Meltdown and Spectre issues.
Intel wraps up Meltdown-Spectre patching for all CPUs released in the past five years and has redesigned new Cascade Lake CPUs to mitigate the attacks.
A breakdown of what the Meltdown and Spectre exploits are, what they aren’t, the risks they pose, and what you should do.
Bugs & Bugs: Gypsy Moth invasion, cyborg locusts, Zero Days -- the movie, bug problems for Lenovo, Symantec & others, and super interesting research from New York University & others aimed at reducing software bugs
If the probability of your assets being prodded by attackers foreign and domestic doesn't scare the bejesus out of you, don't read this article. If you're operating in the same realm of reality as the rest of us, here's your shot at redemption via some solid preventive pen testing advice from a genuine pro.
Is it possible to secure the Internet? And if so, what would it cost?
Everyone knows that IT is a cost center. What many people don't know is that recognizing and leveraging the connection between security risk mitigation and profits can create profit margin growth.
Increasing mandates around the security of personal data have made encryption for every business. Australian businesses are leading the world in the use of encryption to protect backups, payment-related data, and laptops – and yet they still have a long way to go before encryption is both ubiquitous and manageable.
If your last access-control update was even a few years ago, you’re probably more exposed to fraud and exploitation than you’d like to be.
It’s not hard to understand why bot management is critical to maintaining business availability and customer satisfaction – but do you know how to properly deal with bots?
Increasing use of encryption has created new challenges for enterprise security managers. Ever more-sophisticated encryption such as Perfect Forward Secrecy (PFS) protects data and may even boost your Google ranking – but it also provides a haven for malicious code that may use encryption to bypass enterprise security controls.
Why nation-state attacks are everyone’s problem