December 30, 2015 Cybercrime Has a New Entry Point: Smart TVs 2 min read - Smart TVs are a soft entry point for those intent on cybercrime, especially attackers who prey on a user's ignorance of IT security practices.
December 22, 2015 Xmas Hit List: Three Security Vulnerabilities Unwrap Critical Risks 3 min read - A set of three critical security vulnerabilities may be opening the door for cybercriminals to attack enterprises during the holiday weeks.
December 21, 2015 MongoDB Databases May Be Exposed by Security Misconfigurations 2 min read - A security researcher has discovered that thousands of MongoDB databases are publicly exposed on the Internet, creating vulnerabilities for organizations.
December 1, 2015 All Patched Up: Software Catches a Break Over Holiday Weekend 2 min read - Lenovo, LinkedIn and Zen Cart addressed serious software flaws during the holiday weekend, but now users can rest assured that vulnerabilities are patched.
Government November 16, 2015 Old Voting Tech Puts 2016 Election at Risk — Time for a Veto? 3 min read - Voting technology is going to be under a lot of pressure in less than a year. Are there enough security safeguards to protect these machines?
November 5, 2015 Google’s Project Zero Discovers 11 Security Issues in Galaxy S6 Edge 2 min read - The team at Google's Project Zero has discovered 11 high-impact security issues in Galaxy S6 Edge devices, and Samsung is moving to patch quickly.
Data Protection November 2, 2015 From Compliance to Breaches: Managing Data Source Vulnerabilities Is a Big Challenge 3 min read - IBM Security Guardium Vulnerability Assessment can help solve a twofold problem faced by many enterprises: managing compliance and securing data.
October 28, 2015 Cybercriminals Exploit Joomla Security Flaw Before Webmasters Upgrade Their CMS 2 min read - Once news of the Joomla security flaw was made public, cybercriminals didn't waste any time trying to strike against vulnerable websites.
October 27, 2015 New IoT Vulnerabilities Power Up Security Concerns 3 min read - The Internet of Things (IoT) comes with inherent risk. The newest threat is a series of vulnerabilities in a set of power analysis tools.
Application Security October 27, 2015 Maximizing Effectiveness of Your Application Security Testing Program With Cognitive Intelligent Finding Analytics 4 min read - Your application security testing program can be improved with the addition of cognitive learning strategies such as fixed-point analysis.