In this Industry Perspective, Thomas Hofmann of the firm Flashpoint* writes that cyber threat intelligence professionals from the government don’t just bring their skills when they migrate to the private sector – they bring their jargon, also. Communicating effectively with the C-suite, however, demands making threat intelligence ready for executive consumption.
Business
Researchers Warn of Physics-Based Attacks on Sensors
Billions of sensors that are already deployed lack protections against attacks that manipulate the physical properties of devices to cause sensors and embedded devices to malfunction, researchers working in the U.S. and China have warned.
Lasers Eyed as Way Forward for Quantum Encryption of Data, Cryptocurrencies
Researchers at the University of Southern California have developed a technology called a frequency comb that could pave the way for quantum-encryption technologies to be used to protect mobile data and digital currencies.
Five Essential Reads to Understand the Meltdown and Spectre Processor Flaws
There has been plenty of (digital) ink spilled in recent days about widespread processor flaws known as “Meltdown” and “Spectre.” We round up five articles that will help you understand these security vulnerabilities, how they were discovered and their likely impact.
Update: Two Years After Discovery Dangerous Security Hole Lingers in GPS Services
Security researchers warned of a serious vulnerability in a GPS service by the China-based firm ThinkRace exposes sensitive data in scores of GPS services, more than two years after the hole was discovered and reported to the firm. (Update: added comment from John van den Oever, the CEO of one2track B.V – PFR 1/3/2018)