7 memory mismanagements and a timing attack. We explain all the jargon bug terminology in plain English...
To borrow from HHGttG, please DON'T PANIC. But if you are two years out of date with patches, please do ACT NOW!
Hear renowned cybersecurity author Andy Greenberg's thoughtful commentary about the "war on crypto" as we talk to him about his new book...
Company transcribed ultra-personal conversations, didn't secure them. Criminal stole them, then extorted thousands of vulnerable patients.
It's a bug fix for a bug fix. A memory leak was turned into a double-free that has now been turned into correct code...
Latest episode - listen now!
Is it a vulnerability if someone with control over your account can mess with files that your account is allowed to access anyway?
There was a breach, so the bad news isn't great, but the good news isn't too bad...
Enjoy our Serious Security deep dive into this real-world example of why cryptographic agility is important!
Unfortunately, you've probably already heard the cliche that "cybercrime abhors a vacuum"...
Follow RSS Feeds, Blogs, Podcasts, Twitter searches, Facebook pages, even Email Newsletters! Get unfiltered news feeds or filter them to your liking.Get Inoreader