August 20, 2015 Research Shows DDoS Attack Volumes Doubling as Threat Vectors Proliferate 2 min read - Cybercriminals are using everything from home routers and WordPress plugins to legacy directory services to launch a DDoS attack, new research shows.
August 20, 2015 LinuxCon: CII Program Will Give Badges to Open Source Projects With Strong Security 2 min read - Open source projects have gotten a bad rap in security circles thanks to Heartbleed and other flaws, but an industry consortium may change that.
August 19, 2015 SCADA System Vulnerabilities Put Industrial Control Sector on High Alert 2 min read - Two weeks after vulnerabilities were revealed at DEF CON, a major piece of SCADA software remains unpatched, ICS-CERT has warned.
August 18, 2015 New BitTorrent DRDoS Attacks Amp Up Risk, Researchers Warn 2 min read - New BitTorrent distributed reflective denial-of-service (DRDoS) vulnerabilities are making noise across the net. Here's a rundown on the amped-up attacks.
August 18, 2015 Insecure Configuration of MongoDB, Other Databases Could Be Leaking Information 2 min read - A recent report suggested poor configurations of MongoDB, Redis and similar database products may be exposing data to cybercriminals.
August 14, 2015 New WordPress XSS Vulnerability Crosses the Privilege Line 2 min read - A new XSS vulnerability set for WordPress raises sersious security questions, but it's not the only set of flaws to come to light recently.
August 11, 2015 Wearable IoT Ransomware: Locking Down Your Life? 2 min read - Security risks are on the move: New IoT ransomware can now infect wearable devices. But what does this mean for tech-savvy users?
August 11, 2015 Subpar SOAP? Why Your Windows Update Might Be Dirty 2 min read - Any Windows update could now be dirty thanks to subpar SOAP settings used by some companies that leave them open to vulnerability exploitation.
August 11, 2015 DGA Changer Malware Variant Shows How Attackers Are Improving Domain Names 2 min read - Researchers have discovered that those attackers behind the DGA Changer malware have come up with an even better way to avoid sandbox detection.
August 7, 2015 Are Cloud File Sync Tools Out of Step With Security? 2 min read - File sync services are now at risk of man-in-the-cloud (MitC) attacks, putting critical information at risk. What's the threat level for corporate data?