CISO October 11, 2016 The Pros of Attending Cons: Why Conferences Offer the Best Security Education Opportunities 3 min read - Cybersecurity conferences can be expensive and require months of planning and lots of travel, but the security education benefits far outweigh the costs.
CISO August 26, 2016 Security Conferences Abound: Which Should You Attend? 4 min read - Security leaders, professionals and operational business leaders all stand to benefit from the myriad security conferences being held in 2017.
August 8, 2016 HEIST Uses a Cryptographic Scheme to Steal Data 2 min read - Cybercriminals developed HEIST, or "HTTP Encrypted Information can be Stolen Through TCP-Windows," to steal data using a cryptographic scheme.
August 2, 2016 Flaws Found: Social Side of Black Hat App Goes Dark 2 min read - The official 2016 Black Hat app contained a number of serious social flaws, which organizers disabled before the app went live.
X-Force August 2, 2016 X-Force Red Gets Serious About Penetration Testing 2 min read - X-Force Red offers vulnerability analytics backed by the experience of hundreds of thousands of the world's best technologists.
X-Force July 31, 2016 Hungry Hippos Meet Interactive Cyber Management at Black Hat USA 2016 2 min read - A unique, interactive game at this year's Black Hat USA event will test players' ability to stay calm in a crisis, a key skill to have during a cyberattack
Software Vulnerabilities July 29, 2016 Read From PDF, Write to Edge’s Memory (CVE-2016-0117) 3 min read - CVE-2016-0117 can be exploited to perform an arbitrary write to Edge's content process memory, a critical element for remote code execution.
September 9, 2015 Security Researcher Shows a Cheap and Simple Way to Hack a Self-Driving Car 2 min read - A security researcher has discovered a way to hack a self-driving car relatively easily and for little money using a makeshift laser pointer.
August 26, 2015 LG, Samsung Phones at Risk of Certifi-gate Android Vulnerability 2 min read - A new Android vulnerability has come into the spotlight, causing some Samsung and LG smartphone users to think twice about their authentications.
Application Security August 25, 2015 What Do Technology Professionals Want in an Application Security Testing Solution? 3 min read - At the most recent Black Hat USA conference in Las Vegas, security experts told IBM what they want out of an application security testing tool.