July 13, 2016 ‘Pokemon Go,’ Popular New AR Game, Can Load Malware 2 min read - "Pokemon Go" can load rootkits into devices along with the hot game, which could wreak havoc on individual users and enterprise networks alike.
Advanced Threats July 8, 2016 3-D Printing Vulnerabilities: Build Your Own Breach? 3 min read - A surge in 3-D printing vulnerabilities could leave the enterprise open to intellectual property theft or general process disruption.
Software Vulnerabilities July 7, 2016 Remote Code Execution in Xiaomi MIUI Analytics 3 min read - The IBM X-Force AppSec Research Team has discovered a remote code execution (RCE) vulnerability in MIUI, the flavor of Android developed by Xiaomi.
July 7, 2016 Microsoft Cybersecurity Advocates for Coordinated Norms 2 min read - The latest Microsoft cybersecurity initiative pushed for a more coordinated effort surrounding vulnerability disclosure and communication.
July 6, 2016 Out of the Office? Not Quite — Old Microsoft Vulnerabilities Still Wreaking Havoc 2 min read - A series of old Microsoft vulnerabilities continues to cause problems in Microsoft Office products. Here's what users need to know.
July 6, 2016 Android Encryption Fails Thanks to Qualcomm Chips 2 min read - A security researcher discovered that the Qualcomm-made chips at the center of Android encryption can be exploited in a sophisticated attack.
Endpoint July 6, 2016 Adapting Your Defenses to the Attack: The Next Generation of Endpoint Protection 2 min read - The endpoint protection of the future must be able to identify indicators of compromise, locate vulnerabilities and move to patch them quickly.
June 30, 2016 Symantec Vulnerabilities Are Severe, Require Immediate Action 2 min read - A security researcher at Google recently found more than two dozen severe Symantec vulnerabilities affecting several security products.
Data Protection June 15, 2016 Uncovering Risk From SAP HANA Vulnerabilities Can Be Simple and Easy 2 min read - Vulnerabilities in a SAP HANA system can result in major consequences for users, but identifying and remediating these issues can be easy.
Application Security June 3, 2016 Inside the Mind of a Hacker: Attacking the Memory 4 min read - A savvy hacker may identify vulnerabilities that lead to memory attacks. Learn what contributes to these issues and best practices for avoiding them.