Security researchers have identified a security vulnerability related to encryption on Bluetooth BR/EDR connections. As a result, an unauthenticated attacker near the vulnerable device could exploit the issue and escalate privileges or steal information.
WordPress version 5.2 dubbed "Jaco" is available for download and includes a number of new security features and improvements, such as digitally-signed updates, Site Health Check, and PHP error protection.
Security researchers at F-Secure have uncovered a decade-old attack that exploits firmware weaknesses in laptops to expose encryption keys and sensitive data.
TLS 1.3 has officially become standard last week, offering improved privacy, security and performance to the internet security protocol.
NCCIC has issued a security advisory and mitigation guidance for a bluetooth vulnerability that impacts Bluetooth firmware and operating system software drivers from multiple vendors.
A new ransomware decryption tool released by Talos security group allows victims to gain access to their locked data if infected by the Thanatos ransomware.
The Wi-Fi alliance announced a new and improved next-generation Wi-Fi security for personal and enterprise networks dubbed "WiFi CERTIFIED WPA3."
Researchers at Germany’s Ruhr University Bochum released a technical research paper outlining security shortcomings in WhatsApp, that could allow unauthorized users to infiltrate and spy on private group chats.
Security researchers have discovered serious weaknesses and total breakdown in WPA2, a security protocol used to secure protected Wi-Fi networks. An attacker within range of a victim's Wi-Fi device could exploit these weaknesses using key reinstallation attacks (KRACKs).
These 10 critical yet practical data security controls can help your small or mid-sized business safeguard sensitive data and be better prepared for the General Data Protection Regulation (GDPR), soon to…