Researchers at Endgame are expected at Black Hat to introduce Hardware Assisted Control Flow Integrity (HA-CFI), which leverages features in the micro-architecture of Intel processors for security.
Microsoft yesterday announced that each of the three finalists in the BlueHat Prize $250,000 security contest came up with ways to detect and stymie one of the most effective exploit methods now being ...
Intel has come up with a chip-level plan to defeat attacks that use return-oriented programming to exploit memory vulnerabilities. The new measures are outlined in a preview specification from Intel ...
Security researcher and Columbia University PhD student Vasilis Pappas was announced the winner of the Microsoft BlueHat Prize contest for an exploit mitigation technology called “kBouncer” which is ...
While robust passwords help you secure your valuable online accounts, hardware-based two-factor authentication takes that security to the next level. Read now Academics have developed a new technique ...
At Microsoft’s Black Hat USA Researcher Appreciation Party, the company announced the winners of its BlueHat Prize. The party was packed with about 900 invited guests. On stage were a DJ and two women ...
Microsoft today launched a security toolkit preview that includes anti-exploit technologies created by one of the three finalists in the company’s $250,000 BlueHat Prize contest. Enhanced Mitigation ...
Researchers at FireEye have discovered exploits targeting Flash and Silverlight in the Angler exploit kit, which are bypassing Microsoft’s system hardening Enhanced Mitigation Experience Toolkit (EMET ...
Researchers have uncovered new, currently unpatched vulnerabilities in multiple versions of Internet Explorer that criminals are actively exploiting to surreptitiously execute unusually advanced ...
Microsoft announced that the latest version of its Enhanced Mitigation Experience Toolkit, EMET 5.0, was released to general availability today. The latest version of Microsoft’s freely available ...
Two Flash vulnerabilities that were fixed by Adobe 2 weeks ago are now being used in exploit kits. This is in addition to a third vulnerability, CVE-2014-0556, that was patched in September and that ...
A new PDF exploit that uses a good certificate and fancy programming thumbs its nose at Windows 7's two big new security measures On Wednesday, Adobe posted yet another advisory for a flaw in Adobe ...