SearchSecurity

New & Notable

News

Google Chrome adds protections against Spectre attacks

In an effort to mitigate the risk of Spectre attacks, Google Chrome site isolation has been enabled for 99% of browser users to minimize the data that could be gleaned by an attacker.

News

Intel pays $100,000 bounty on new Spectre attacks

Researchers discovered two new Spectre variants that can be used to bypass protections and attack systems and earned $100,000 in bug bounties from Intel.

News

RiskIQ: Ticketmaster breach was 'tip of the iceberg'

News roundup: The Ticketmaster breach was part of a massive digital credit card-skimming campaign. Plus, the U.K. fined Facebook over the Cambridge Analytica scandal, and more.

Manage

How a highly critical Drupal vulnerability affects users

A recently discovered Drupal vulnerability in its open source CMS allowed attackers to control websites. Learn how almost one million sites were affected with Michael Cobb.

Topics Covered

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Information Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

  • Get Started

    Certified Cloud Security Professional (CCSP)

    The Certified Cloud Security Professional (CCSP) certification is intended for experience IT professionals who have a minimum of five years of experience in the industry with three of those years being in information security and one year in one of ...

  • Get Started

    federated identity management

    Federated identity management (FIM) is an arrangement that can be made between multiple enterprises to let subscribers use the same identification data to obtain access to the networks of all the enterprises in the group.

  • Get Started

    next-generation firewall (NGFW)

    A next-generation firewall (NGFW) is a part of the third generation of firewall technology that is implemented in either hardware or software and is capable of detecting and blocking sophisticated attacks by enforcing security policies at the ...

View All Get Started

Multimedia

Videos, Podcasts and Photo Stories

Blog: Security Bytes

Sections from across SearchSecurity

  • News

    View All
  • Web browser security

    Google Chrome adds protections against Spectre attacks

    In an effort to mitigate the risk of Spectre attacks, Google Chrome site isolation has been enabled for 99% of browser users to minimize the data that could be gleaned by an attacker.

  • Cyberespionage and nation-state cyberattacks

    Special Counsel indicts 12 Russian GRU officers

    A grand jury for Special Counsel Robert Mueller's election interference investigation indicted 12 Russian intelligence officers for crimes related to the DNC and DCCC hacks.

  • Hacker tools and techniques: Underground hacking sites

    Intel pays $100,000 bounty on new Spectre attacks

    Researchers discovered two new Spectre variants that can be used to bypass protections and attack systems and earned $100,000 in bug bounties from Intel.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close