By manipulating the voltage of Intel CPUs that use SGX, researchers can extract sensitive data, including full RSA encryption keys.
Stories by Lucian Constantin
Attackers can use the vulnerability to gain complete control of the phone. It underscores the risks of using old open-source code in IoT devices.
Researchers have found 11 serious vulnerabilities in VxWorks, the world's most popular real-time operating system.
A report from Zscaler reveals some troubling facts about the risks posed by network-connected IoT devices.
Intel has done some mitigations for these vulnerabilities that can leak secrets from virtual machines, secure enclaves and kernel memory. Here's how the attacks work.
A group of hackers is using a previously undocumented backdoor program designed to interact with attackers over Slack.
New Verizon report shows a big gap between organisations' mobile security risk concerns and mobile security best practices they implement.
The decade-old Qbot financial malware has resurfaced with an improved version in a new attack that has infected thousands of systems so far.
Microsoft has removed eight applications from its app store for Windows that were mining Monero crypto-currency without users' knowledge.
The low number of fines relative to the volume of reported breaches might be due to over-extended regulators, according to DLA Piper findings.
A group of hackers that previously leaked alleged NSA exploits claims to have even more attack tools, as well as intelligence gathered by the agency on foreign banks and ballistic missile programs.
As the WannaCry ransomware attack evolves, more cybercriminals are likely to attempt to profit from the vulnerability it exploits and similar flaws in the future.
In response to recent attacks where hackers abused Google's OAuth services to gain access to Gmail accounts, the company will review new web applications that request Google users' data.
Attackers behind the highly successful Locky and Bart ransomware campaigns have returned with a new creation: A malicious file-encrypting program called Jaff that asks victims for payments of around $3,700
Users of Asus RT-N and RT-AC series routers should install the latest firmware updates released for their models because they address vulnerabilities that could allow attackers to hijack router settings.
Small to medium businesses (SMBs) are massively important to the economy.