Security Experts:

long dotted


AMD will soon provide optional processor microcode updates designed to mitigate Spectre attacks. Meltdown does not impact the company's CPUs [Read More]
Endpoint protection firm Endgame has been awarded a $1 million contract by the U.S. Fleet Cyber Command for the acquisition of the Endgame Hunt Team Platform with 10,000 sensors, plus maintenance and support. [Read More]
IBM starts releasing firmware updates for its POWER processors to address the recently disclosed Meltdown and Spectre vulnerabilities [Read More]
But what if your antivirus was intentionally turned into a tool that could spy on you? Would that be possible without modifying the program itself? [Read More]
Microsoft says users with older CPUs will notice a decrease in performance after applying the Spectre and Meltdown updates [Read More]
AMD users no longer receive Windows updates that patch Meltdown and Spectre, and Microsoft warns that some devices may not receive future security updates due to antiviruses [Read More]
Apple updates iOS, macOS and Safari to mitigate the effects of the CPU vulnerabilities behind the Spectre attack. Meltdown mitigated before disclosure [Read More]
Microsoft’s updates for the Meltdown and Spectre CPU vulnerabilities break Windows on some AMD computers. Patches also cause problems for some apps [Read More]
Intel has started releasing software and firmware updates to protect devices against Meltdown and Spectre attacks. Updates expected for most CPUs by the end of next week [Read More]
Devices with Intel, AMD and ARM CPUs are vulnerable to Meltdown and Spectre attacks, which can allow hackers to obtain passwords and other sensitive information [Read More]

FEATURES, INSIGHTS // Endpoint Security

rss icon

Andrew Jaquith's picture
As with most stories Mac-related, the malware-is-finally-coming story attracted a lot of press. But the desktop Mac OS might not be attractive to attackers as you might think.
Noa Bar-Yosef's picture
Are major data breach headlines helping consumers become more secure? Not necessarily. Many users still ignore security advisories, and our lackadaisical approach to security affects other consumers.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!
Ram Mohan's picture
Are your passwords safe? Three simple ways to create memorable yet secure passwords
Mike Lennon's picture
A new report from Palo Alto Networks examines user and application trends in the enterprise, covering 1,100 applications across 723 organizations, providing a fascinating glimpse into what’s happening within the networks of enterprises around the globe.
Alex Thurber's picture
Social Media Use Policy - The consumerization of IT is affecting all aspects of the way we work. As Web 2.0 technologies continue to gain popularity amongst employees, IT departments are struggling to understand and manage the challenges.
Markus Jakobsson's picture
Anti-virus products scan for malware in two ways. They look for sequences of bits that are found in programs that are known to be “evil” (but which are not commonly found in “good” programs)...