The Rowhammer and memory deduplication attack enables read and write access to Microsoft Edge browsers. Expert Nick Lewis explains how to mitigate this threat.
An HTTPS session with a reused nonce is vulnerable to the Forbidden attack. Expert Nick Lewis explains how the attack works, and how to properly secure HTTPS-authenticated sites.
Researchers identified 110 malicious Tor HSDirs that were found snooping information. Expert Kevin Beaver discusses the takeaways from this research for enterprises.
The government has introduced stringent new responsibilities on IT suppliers in its latest cyber security strategy
About This E-Newsletter This email is published by the TechTarget Security Media Group. Copyright 2017 TechTarget, Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners.
To unsubscribe from all Security Media Group emails, Go to unsubscribe.
TechTarget Security Media Group, 275 Grove Street, Newton, MA 02466 Contact: webmaster@techtarget.com
When you access content from this email, your information may be shared with the sponsors of that content as described in our Privacy Policy.
About TechTarget: TechTarget publishes media for IT pros with more than 100 focused websites providing quick access to a deep store of news, advice and analysis about the technologies, products and processes crucial to your job.
No comments:
Post a Comment