October 5, 2015 From the Grave: Adobe Exploit Rises Again 2 min read - An Adobe Flash Player exploit has reappeared after it was thought to be mitigated in a recent patch. What's the risk for users of this popular program?
Software Vulnerabilities August 3, 2015 MemGC: Use-After-Free Exploit Mitigation in Edge and IE on Windows 10 3 min read - When used effectively, MemGC could help reduce the number of use-after-free vulnerabilities that plague Edge and Internet Explorer in Windows.
June 10, 2015 WhatsApp Setup Process Could Let Would-Be Criminals Easily Access Accounts 2 min read - If a WhatsApp user's phone gets stolen, it wouldn't be hard to get access to a security code that would let third parties access and take over accounts.
March 25, 2015 All Four Major Browsers Hacked in Pwn2Own Competition 3 min read - All four major browsers were hacked by security researchers at the Pwn2Own competition, which is designed to encourage responsible bug disclosures.
March 17, 2015 Google Researchers Develop Exploits for DRAM Rowhammer Hardware Bug 2 min read - Security researchers at Google have found a way to reliably exploit a serious hardware bug that is present in many laptop devices.
Software Vulnerabilities March 11, 2015 DroppedIn: Remotely Exploitable Vulnerability in the Dropbox SDK for Android 8 min read - IBM X-Force has discovered a vulnerability in Dropbox SDK for Android that lets attackers connect mobile apps to Dropbox accounts that they control.
Software Vulnerabilities March 6, 2015 WordPress and the GHOST Vulnerability 3 min read - WordPress and its users may be vulnerable to the recently reported GHOST vulnerability through a remote, unauthenticated attacker.
Software Vulnerabilities October 28, 2014 Revelations in Data Protection in the Aftermath of Shellshock 3 min read - Sometimes less is more. But when it comes to data protection, more is definitely more, as proven by new research into the recent Shellshock vulnerability.
Mainframe May 15, 2014 Detection Is NOT the New Prevention 5 min read - What does it take to stop today's extremely motivated and well-trained cyber attackers? Is prevention pretty much dead? Is rapid detection the new prevention? There has been a dangerous shift recently in the prevailing wisdom of the security industry that…
Malware March 17, 2014 Killer Music: Hackers Exploit Media Player Vulnerabilities 3 min read - IBM research has found that cyber criminals are exploiting media player vulnerabilities to infect users' workstations with malware.