Sistemas operacionais móveis e segurança – evolução

By: Alexandre Vasconcelos

Sistemas Operacionais são a base da computação desde seus primórdios, pois sempre foi necessário ter uma fundação e plataforma base, a partir de onde outros programas serão executados. É um tema fascinante e extenso, cadeira obrigatória nos cursos de computação. Sistemas Operacionais de dispositivos Móveis, mais recentes, inevitavelmente são derivações (ou até mesmo adaptações) de …

Cyber-Attacks Are Top Business Risk in North America and Europe

By: Phil Muncaster

Cyber-attacks are the number one business risk in the regions of Europe, North America and East Asia and the Pacific, according to a major new study from the World Economic Forum(WEF). Its Regional Risks for Doing Business report highlights the opinions of 12,000 executives from across the globe. While “unemployment or underemployment” and “failure of national governance” take …

Two New Bluetooth Chip Flaws Expose Millions of Devices to Remote Attacks

By: Swati Khandelwal

Security researchers have unveiled details of two critical vulnerabilities in Bluetooth Low Energy (BLE) chips embedded in millions of access points and networking devices used by enterprises around the world. Dubbed BleedingBit, the set of two vulnerabilities could allow remote attackers to execute arbitrary code and take full control of vulnerable devices without authentication, including medical …