Cloud Security June 23, 2015 Platform-as-a-Service (PaaS) Cloud Side-Channel Attacks: Part I 5 min read - A discussion of three types of cloud environments and details on three side-channel attacks on the platform-as-a-service (PaaS) cloud model specifically.
May 5, 2015 Mumblehard Malware: Linux-Based Spam Generator Went Unnoticed for Five Years 2 min read - Researchers from ESET say the Mumblehard malware has infected thousands of machines, sending spam and staying undetected for more than five years.
Fraud Protection March 12, 2015 How Safe Is Your OS and Web Browser Combination Against the Most Prevalent Malware Strains? 3 min read - A new IBM infographic reveals the most prevalent malware strains, their specific tactics and their effect on popular operating systems and Web browsers.
Software Vulnerabilities March 6, 2015 WordPress and the GHOST Vulnerability 3 min read - WordPress and its users may be vulnerable to the recently reported GHOST vulnerability through a remote, unauthenticated attacker.
Mainframe February 25, 2015 Discovering Vulnerabilities: Do More Eyes Find More Bugs? 7 min read - Security vulnerabilities have surprisingly long lifetimes, and organizations can use many methods to respond to and prevent infrastructure threats.
Software Vulnerabilities January 29, 2015 Ghost in the Machine: Linux Zero-Day Vulnerability Opens Door for Attack 3 min read - A Linux zero-day vulnerability, dubbed "Ghost," was recently discovered. It lets malicious code execute on servers that use the glibc functionality.
October 3, 2014 Spiked! New DDoS Toolkit Drives Home Network Vulnerabilities 2 min read - Corporate networks should keep their eye on Spike, a new type of distributed-denial-of-service (DDOS) attack that goes beyond desktops to attack routers.
X-Force September 26, 2014 Bash Shellshock Exploits Could’ve Been Avoided 7 Years Ago. What To Do Today! 4 min read - The Bash Shellshock bug could be worse than the Heartbleed vulnerability, but it could've been avoided 7 years ago with Protocol Analysis.
September 26, 2014 Shellshock: Where the Bash Bug Could Hit the Hardest 2 min read - The Bash bug, a new vulnerability known as Shellshock, could have a sizable impact on an untold number of devices, according to security experts.