Intel launches Sandy Bridge technology platform
Intel launch in pictures
19 Jan | View galleries
Researchers claim that the latest side-channel exploit against Intel processors can be used to leak a targeted set of data.
Mark Hachman | 28 Jan | Read more
By manipulating the voltage of Intel CPUs that use SGX, researchers can extract sensitive data, including full RSA encryption keys.
Lucian Constantin | 11 Dec | Read more
Google brings site isolation to Chrome on Android and improves the defense for Chrome on the desktop.
By replacing a PC's SPI flash chip with one that contains rogue code, an attacker can can gain full, persistent access.
Lucian Constantin | 11 May | Read more
Chip makers release patches but they'll customers will need to choose between security and performance.
A breakdown of what the Meltdown and Spectre exploits are, what they aren’t, the risks they pose, and what you should do.
Bugs & Bugs: Gypsy Moth invasion, cyborg locusts, Zero Days -- the movie, bug problems for Lenovo, Symantec & others, and super interesting research from New York University & others aimed at reducing software bugs
If the probability of your assets being prodded by attackers foreign and domestic doesn't scare the bejesus out of you, don't read this article. If you're operating in the same realm of reality as the rest of us, here's your shot at redemption via some solid preventive pen testing advice from a genuine pro.
David Geer | 07 Jul | Read more
Is it possible to secure the Internet? And if so, what would it cost?
Taylor Armerding | 03 Jul | Read more
Everyone knows that IT is a cost center. What many people don't know is that recognizing and leveraging the connection between security risk mitigation and profits can create profit margin growth.
David Geer | 27 May | Read more