Over the past many years, there’ve been a plethora of security solutions available for Windows-based endpoints, but most of them are helpless against malicious code targeting the kernel - even when we employ layered security and stack them one upon the other.
Late last year, documents from Edward Snowden's NSA trove have revealed that Britain's GCHQ has mounted a successful attack against Belgacom (the largest telecom in Belgium) and its subsidiary BICS (Belgacom International Carrier Services), a Global Roaming Exchange (GRX) provider.
In this podcast, wireless security researcher Michael Ossmann shares his insights on what to use - and how - to duplicate hardware devices found in the ANT catalog.
The Unified Extensible Firmware Interface (UEFI) is ment to replace the Basic Input/Output System (BIOS) firmware interface found on all IBM PC-compatible personal computers.
In this podcast, recorded at Hack In The Box Amsterdam 2014, Lisha Sterling, Developer Coordinator at Geeks Without Bounds, talks about the problems in cybersecurity education.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.