The classic image of the Hollywood hacker is misleading. The typical cybercriminal is more likely to be a state-sponsored actor or malicious insider.
Companies have a vested interest when it comes to ferreting out IT problems before cybercriminals manage to launch attacks in the wild. The recent Mirai infections are proof positive that compromised Internet of Things (IoT) devices paved the way...
A vulnerability report is designed to alert vendors of potential security issues, but it can also help cybercriminals identify weak spots to attack.
The second season of "Mr. Robot" could focus on IoT and hacking a connected building, just like the IBM X-Force team was able to do in real life.
The way movies and television shows portray a hacker is far off from reality. In today's collaborative world, attackers are often working in crime rings.
All four major browsers were hacked by security researchers at the Pwn2Own competition, which is designed to encourage responsible bug disclosures.
When crafting your organization's cybersecurity plans, consider hiring an ethical hacker to find the vulnerabilities in your system.
The only way to really test your organization's cybersecurity measures is to attack them — which means learning to think like a black-hat hacker.
Fifty percent of the exploits observed by Trusteer and IBM X-Force Research in December 2013 targeted Java vulnerabilities.
What can we do to help developers learn about preventing incidence of SQLi vulns in their production applications? And what can we do about SQLi in legacy web applications or newer apps that were developed with SQLi vulnerabilities? This is a weekly...