Researchers have published details of what they claim is a Chinese-speaking nation-state actor which has been targeting a number of south-east Asian countries for more than a year, using vulnerabilities in Microsoft Exchange as an entry point. The campaign has been given the name GhostEmperor.
Russian security firm Kaspersky claims to have found a number of suspicious UEFI images, based on the leaked source code of the Italian firm Hacking Team, containing a malicious implant that could be used place a malicious update on a Windows system.
An exploitation tool for Windows systems, used by an alleged Chinese hacking collective, uses a variant of an NSA exploit which was leaked online by a group known as the Shadow Brokers, the Israeli security company Check Point claims, adding that their findings suggested China and the US were in some kind of race to develop cyber exploits.
Most cybersecurity is making up for weak platforms. We need to address the fundamentals, design platforms that prevent out-of-bounds access[…]
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]
There are two flaws that are widespread in the industry here. The first is that any platform or language should[…]
Ajai Chowdhry, one of the founders and CEO of HCL is married to a cousin of a cousin of mine.[…]