Raising The Bar: The New Normal Requires Innovative New Security Technologies
Forbes – The world of technology is always evolving, and the threat landscape is continuously adapting and expanding. That part isn’t new. As with many other areas of life, though, 2020 seems to have shifted the playing field and changed the rules a bit more than usual. Privacy and security are simultaneously more crucial and more challenging than ever—which is why Intel remains intently focused on these areas.
Do Cyberattacks Affect Stock Prices? It Depends on the Breach
DarkReading – A security researcher explores how data breaches, ransomware attacks, and other types of cybercrime influence stock prices.
Exploiting Embedded Linux Devices Through the JTAG Interface
Techspective – With the explosion of internet-of-things (IoT) and connected, industrial IoT (IIoT), and connected, smart home devices, it is getting harder and harder to find things that don’t have some sort of embedded operating system and connectivity today. If it’s a connected device running an operating system, there is a very good chance that an attacker can find a vulnerability to exploit to compromise the device and gain access to your network. That is true even in a best-case scenario where secure development principles and basic security best practices are…
Exploiting Embedded Linux Devices Through the JTAG Interface
Security Boulevard – With the explosion of internet-of-things (IoT) and connected, industrial IoT (IIoT), and connected, smart home devices, it is getting harder and harder to find things that don’t have some sort of embedded operating system and connectivity today. While connected devices can streamline productivity and provide a variety of benefits, they also expose you to risk.
What Can Your Connected Car Reveal About You?
Dark Reading – App developers must take responsibility for the security of users’ data. The smartphone has become the central command center for many people’s lives. A 2020 study found that the average user has 67 apps on their phone — but most people never stop to think about what data those apps contain or how well protected it is.