• FCC, FTC Probe Carriers' Mobile Security Patch Protocols

    FCC, FTC Probe Carriers' Mobile Security Patch Protocols

    The Federal Trade Commission (FTC) and the Federal Communications Commission (FCC) are joining forces to help determine how long it takes mobile device security updates to roll out to consumers.First, the FTC has ordered eight mobile device manufacturers to provide the agency with information about how they issue security updates to address vulnerabilities in smartphones, tablets, and other mobile devices.
  • 4 Major Vulnerabilities Discovered In HTTP/2 Protocol

    4 Major Vulnerabilities Discovered In HTTP/2 Protocol

    The team took an in-depth look at HTTP/2 server implementations from Apache, Microsoft, NGINX, Jetty, and nghttp2.The security researchers discovered exploitable vulnerabilities in all major HTTP/2 mechanisms that it reviewed.
  • 4 Major Vulnerabilities Discovered In HTTP/2 Protocol

    4 Major Vulnerabilities Discovered In HTTP/2 Protocol

    In the research, the company found four different attack vectors, and was able to find an exploitable vulnerability in almost all of the new components of the HTTP/2 protocol.The team took an in-depth look at HTTP/2 server implementations from Apache, Microsoft, NGINX, Jetty, and nghttp2.
  • 10 IoT Security Best Practices For IT Pros

    10 IoT Security Best Practices For IT Pros

    IT professionals have to treat internet of things (IoT) vulnerabilities as they would vulnerabilities in databases or web applications.Any flaw may prove useful to compromise other systems on the network.
  • 10 IoT Security Best Practices For IT Pros

    10 IoT Security Best Practices For IT Pros

    IT professionals have to treat internet of things (IoT) vulnerabilities as they would vulnerabilities in databases or web applications.Any flaw may prove useful to compromise other systems on the network.