As homomorphic encryption gains steam, experts search for standards
As homomorphic encryption gains greater traction, practitioners need a set of agreed parameters for implementing the algorithms.
A bug in Wi-Fi ‘extenders’ could give a hacker full control over the devices
The vulnerability in a piece of TP-Link gear is just the latest bug to be found in popular home networking equipment.
How hackers are changing up their business models
Charles Henderson, global managing partner and head of X-Force Red at IBM, talks with CyberScoop Editor-in-Chief on how cybercriminals are changing their business models based on how organizations quash threats.
Tax scammers impersonating ADP, Paychex with aim to steal financial information
Those messages are laced with TrickBot, a malicious software strain that typically infects victims through a malicious Microsoft Excel attachment.
For many crooks, malware is out and PowerShell attacks are in, IBM says
Fifty-seven percent of the cyberattacks detected by IBM X-Force Threat Intelligence used common applications like PowerShell or PsExec, compared to 29 percent that used more traditional phishing attacks.
From the NSA to Silicon Valley, a new kind of encryption is going commercial
Homomorphic encryption would better protect both personal users and businesses, but it needs to be fleshed out over the coming years.