A group of researchers from North Carolina State University has built a software toolkit to explore vulnerabilities in Appleās mobile processors and used the findings to devise a cache timing attack.
Source: Read More (SecurityWeek RSS Feed)
How the Iranian Government Shut Off the Internet www.wired.com/story/iran-internet-shutoff/ Amid widespread demonstrations over rising gasoline prices, Iranians began experiencing internet slowdowns over the last few days that became a near-total internet and mobile data blackout on Saturday. The government is apparently seeing to silence protestors and quell unrest. So how does a country like Iran […]
Last year, my professional relationship with computers entered its 30th year (in other words: for 30 years now, I’m getting paid to work with computers). One of the things I learned over this period is: “in IT, expect regression”. With regression, I mean this definition: “the process of going back to an earlier or less […]
Researchers believe the focus is moving from cryptocurrency to traditional botnet attacks. Source: Read More (Latest topics for ZDNet in Security)