Protecting Connected Cars from Cyberattack

The smart features built into new cars open the door to serious cyber threats. Linked to the internet, connected cars offer cybercriminals the potential ability to remotely access and manipulate the data these systems rely on, which can lead to proble… Continue reading Protecting Connected Cars from Cyberattack

White-Box Encryption: Ending Web App Vulnerability

Key management must give way to new options that enable and protect true encryption for organizations For as long as they’ve existed, web applications have been a favorite target for hackers. They are relatively easy to break and give hackers potentia… Continue reading White-Box Encryption: Ending Web App Vulnerability

Can Applications Withstand the ZombieLoad Attack?

As if Meltdown, Spectre and Foreshadow were not enough, recently a new critical vulnerability called ZombieLoad has been discovered that affects a series of modern Intel processors. This vulnerability enables a potential attacker to read small pieces … Continue reading Can Applications Withstand the ZombieLoad Attack?

Client Applications: A Hacker’s Easiest Target?

A perfect storm is brewing for any application running in a workstation—the client application—which is putting a target on its back and placing it in the “most vulnerable” category. The increasingly large amount of sensitive data aggregat… Continue reading Client Applications: A Hacker’s Easiest Target?