Remove 2015 Remove Malware Remove Security
article thumbnail

Coro secures $60M at ~$500M valuation for an all-in, SaaS-based cyber protection platform aimed at SMBs

TechCrunch

Enterprises typically dedicate significant money and talent towards protecting themselves from security breaches. ” Add to this how larger enterprises invest in software to equip their security teams. A company like Goldman Sachs might use more than 40 products, he said.

Malware 243
article thumbnail

Karamba’s bold quest to secure connected cars

The Parallax

That’s the scenario Karamba Security is trying to prevent. Karamba’s secret lies in how its award-winning products , Carwall and SafeCAN, respectively protect cars’ electronic control units, or ECUs, and controller area networks, or CAN buses , which are notorious weak spots in car computer security. READ MORE ON CONNECTED CARS.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

RCS delivers new texting features—and old security vulnerabilities

The Parallax

But first, tech giants and telecommunications network providers will have to fix its major security flaws, researchers say. Google has been advocating for RCS since 2015, when it acquired Jibe Mobile, the startup that invented the standard. READ MORE ON PHONE SECURITY AND PRIVACY. Android Q adds privacy, fragmentation.

Mobile 48
article thumbnail

From Bugs to Breaches: 25 Significant CVEs As MITRE CVE Turns 25

Tenable

Twenty five years after the launch of CVE, the Tenable Security Response Team has handpicked 25 vulnerabilities that stand out for their significance. The Tenable Security Response Team has chosen to highlight the following 25 significant vulnerabilities, followed by links to product coverage for Tenable customers to utilize.

article thumbnail

Hidden inside Dark Caracal’s espionage apps: Old tech

The Parallax

Its success was predicated not on “zero-day” vulnerabilities or new forms of malicious software, but rather on older, known malware delivered via an all-too-familiar method: phishing. The malware included hacked versions of end-to-end encrypted communication apps Signal and WhatsApp.

Malware 170
article thumbnail

Fragmentation likely to hinder Android P’s security chops

The Parallax

—Google is prepping the Android world for its next upgrade, code-named Android P, with an array of security and privacy enhancements. But even locking down a long-criticized Android privacy flaw won’t help the operating system beat its biggest security flaw: its own success. READ MORE ON ANDROID SECURITY.

article thumbnail

RSA Conference 2015 – San Francisco 20-24 April 2015

CTOvision

Offering five full days of educational training from experienced industry practitioners, the RSA Conference is widely regarded as one of the world''s leading forums for enterprises and technical information security professionals. Why you need to attend RSA Conference 2015. Seven hours of high level networking. More speakers.