Friday, January 12th, 2018
Following on the heels of the revelations of the Meltdown and Spectre vulnerabilities plaguing decades of Intel's processors, a new flaw in the Active Management Technology (AMT) has left Intel in even more hot water among the cybersecurity community.
The new flaw targets laptops, especially those powered by Intel's enterprise-focused vPro ...
Posted in Hardware, Internet, Privacy, Security | No Comments
Wednesday, December 13th, 2017
Extended validation ("EV") certificates are a unique type of certificate issued by certificate authorities after more extensive validation of the entity requesting the certificate. In exchange for this more rigorous vetting, browsers show a special indicator like a green bar containing the company name, or in the case of Safari ...
Posted in Internet, Privacy, Security | No Comments
Thursday, November 16th, 2017
The Global Cyber Alliance (GCA)—an organization founded by law enforcement and research organizations to help reduce cyber-crime—has partnered with IBM and Packet Clearing House to launch a free public Domain Name Service system. That system is intended to block domains associated with botnets, phishing attacks, and other malicious Internet hosts—primarily ...
Posted in Internet, Privacy, Security | No Comments
Tuesday, September 19th, 2017
Securing your business website with HTTPS isn't just a good idea, it's a necessity. Google Chrome now marks HTTP payment and login pages and search pages as insecure if they're not using HTTPS. Fortunately, Let's Encrypt makes it both free and easy to lock down your websites.
After countless website security ...
Posted in Internet, Networking, Privacy, Security | No Comments
Monday, September 11th, 2017
Google plans to launch a new security feature in the upcoming Chrome 63 browser that notifies users about Man-in-the-Middle (MITM) issues.
MITM is best known as a method to attack user systems by intercepting and manipulating traffic. Many security programs with firewall and browsing components do use similar functionality to inspect ...
Posted in Internet, Privacy, Security | No Comments
Page 3 of 202«12345...102030...»Last »