• img May 30, 2017

Vulnerability opens FreeRADIUS servers to unauthenticated attackers

A vulnerability in the free, open source FreeRADIUS server could be exploited by remote attackers to bypass authentication via PEAP or TTLS. There is currently no indication that the flaw is being exploited in the wild, but as the existence of the flaw has been made public, the likelihood of attacks rises. The good news […]

Read More
  • img May 30, 2017

First post-quantum cryptography on a contactless security chip

Due to their computing power, quantum computers have the disruptive potential to break various currently used encryption algorithms. Infineon Technologies has successfully demonstrated the first post-quantum cryptography implementation on a commercially available contactless security chip, as used for electronic ID documents. Quantum computer attacks on today’s cryptography are expected to become reality within the next […]

Read More
  • img May 30, 2017

5 incident response practices that keep enterprises from adapting to new threats

Security analysts within enterprises are living a nightmare that never ends. 24 hours a day, their organizations are being attacked by outside (and sometimes inside) perpetrators – hackers, hacktivists, competitors, disgruntled employees, etc. Attacks range in scope and sophistication, but are always there, haunting the security teams tasked with guarding against them. To cope with […]

Read More
  • img May 30, 2017

Companies struggling to meet GDPR standards

A new survey conducted by Vanson Bourne asked IT leaders in the U.S., UK, Germany and France about their current data policies to see how well aligned they are with the EU General Data Protection Regulation (GDPR), which comes into force on May 25, 2018. The survey of 500 IT decision makers did not name […]

Read More
  • img May 30, 2017

Healthcare industry continues to struggle with software security

67% of medical device manufacturers and 56% of healthcare delivery organizations (HDOs) believe an attack on a medical device built or in use by their organizations is likely to occur over the next 12 months. According to the results of a recent survey, roughly one third of device makers and HDOs are aware of potential […]

Read More