Source: eweek.com

Dropbox Adds an Offline Way to Do Two-Factor Authentication

Dropbox Adds an Offline Way to Do Two-Factor Authentication

Hack the Air Force Bug Bounty Program Finds 207 Vulnerabilities

Hack the Air Force Bug Bounty Program Finds 207 Vulnerabilities

Hackers Demonstrate Voting Machine Vulnerabilities at DefCon

Hackers Demonstrate Voting Machine Vulnerabilities at DefCon

Details of Apple iCloud Keychain Flaw Emerge at Black Hat

Details of Apple iCloud Keychain Flaw Emerge at Black Hat

Defending Against Drone Incursions Isn't Easy, Black Hat Session Reveals

Defending Against Drone Incursions Isn't Easy, Black Hat Session Reveals

Researcher Reveals BIOS Firmware Implementation Flaws at Black Hat

Researcher Reveals BIOS Firmware Implementation Flaws at Black Hat

Black Hat 2017 Security Conference Set to Reveal New Threats

Black Hat 2017 Security Conference Set to Reveal New Threats

IBM X-Force Red Launches IoT and Connected Car Security Services

IBM X-Force Red Launches IoT and Connected Car Security Services

Internet Bug Bounty Raises New Funding to Improve Open-Source Security

Internet Bug Bounty Raises New Funding to Improve Open-Source Security

Microsoft Launches Program to Shore Up Electric Power Grid Security

Microsoft Launches Program to Shore Up Electric Power Grid Security

Copycat Malware Could Be the Harbinger of Even Worse Cyber-Attacks

Copycat Malware Could Be the Harbinger of Even Worse Cyber-Attacks

CopyCat Malware Infects 14M Android Devices in Ad Fraud Attack

CopyCat Malware Infects 14M Android Devices in Ad Fraud Attack

Business Email Compromise Tops FBI List of Costly Cyber-Attacks

Business Email Compromise Tops FBI List of Costly Cyber-Attacks

Saying Printers Pose a Glaring Security Risk, HP Offers Solution

Saying Printers Pose a Glaring Security Risk, HP Offers Solution

Trend Micro Discloses State of Human Machine Interface Vulnerabilities

Trend Micro Discloses State of Human Machine Interface Vulnerabilities

Cylance Enhances Cyber-Security Platform with Optics for Threat Hunting

Cylance Enhances Cyber-Security Platform with Optics for Threat Hunting