Unfortunately, the Hollywood approach of security hype doesn't do much to help organizations improve their actual security.
The classic image of the Hollywood hacker is misleading. The typical cybercriminal is more likely to be a state-sponsored actor or malicious insider.
The second season of "Mr. Robot" could focus on IoT and hacking a connected building, just like the IBM X-Force team was able to do in real life.
The way movies and television shows portray a hacker is far off from reality. In today's collaborative world, attackers are often working in crime rings.
When crafting your organization's cybersecurity plans, consider hiring an ethical hacker to find the vulnerabilities in your system.
The only way to really test your organization's cybersecurity measures is to attack them — which means learning to think like a black-hat hacker.
Fifty percent of the exploits observed by Trusteer and IBM X-Force Research in December 2013 targeted Java vulnerabilities.
What can we do to help developers learn about preventing incidence of SQLi vulns in their production applications? And what can we do about SQLi in legacy web applications or newer apps that were developed with SQLi vulnerabilities? This is a weekly...
NEW! IBM X-Force 2012 Annual Trend and Risk Report Twice a year since the late 1990s, IBM’s X-Force Research and Development team releases a trend and risk report including content collected from dozens of thought leaders across the...
The IT security industry cannot let its guard down when it comes to Zeus; IBM has observed Zeus-infected websites hosted all over the world.