/août 01, 2017
Quantum computing is coming. What should your strategy be today to deal with what’s on the horizon?
/juil. 13, 2017
Safeguarding TLS against attack in the quantum computing age will require changes to today’s TLS key exchange algorithms.
/mai 16, 2017
Is the Intel AMT vulnerability as bad as we all first thought? Either way, here are some suggestions for protecting yourself.
/mai 02, 2017
One simple error led to the capture of notorious hacker Sabu—and the revelation of his identity.
/avr. 18, 2017
Notorious hacker of Anonymous and LulzSec fame is challenged by rival hacker, The Jester, to reveal his identity.
/janv. 19, 2017
In just four short years, encryption estimates have gone from almost non-existent (in the low single digits before 2013) to just over 50% by the end of 2016. How much of a victory is this?
/oct. 23, 2016
According to DARPA, it takes an average of 312 days for security pros to discover software vulnerabilities such as viruses, malware, and other attacks. In hacker time, that’s a virtual eternity in which bad actors can wreak havoc.
/août 02, 2016
Malicious actors and eavesdroppers are forcing Internet communication into a single cryptographic protocol: SSL.
Get the latest application threat intelligence from F5 Labs.
Follow us on social media.