The Tortoise and the Hare are challenged to develop an app, and the winner must consider both application security and functionality. Who will prevail?
Although it is one of the most crucial components of any security strategy, web application penetration testing is often neglected.
Is your network prepared to handle the IoT? Start by focusing on your application security program, since many IoT threats lurk in the application layer.
The WhatsApp Web client is now vulnerable to a vCard-led attack, according to researchers. How can users patch the vulnerability and avoid the issue?
IBM research has found that cyber criminals are exploiting media player vulnerabilities to infect users' workstations with malware.
What can we do to help developers learn about preventing incidence of SQLi vulns in their production applications? And what can we do about SQLi in legacy web applications or newer apps that were developed with SQLi vulnerabilities? This is a weekly...
The year just started, but already two major software vulnerabilities have made headlines. One concerns Java. The other is called Operation Red October.
Even security-savvy users can fall for fake social engineering attacks through malicious emails sent by cyber criminals to install malware.
Earlier this year, IBM discovered a vulnerability in Apple Safari for Windows (versions 4.0.2 to 4.0.5 and 5.0 to 5.0.2).