August 18, 2016 Proxy Connects Show Evidence of a Software Vulnerability 2 min read - A security researcher recently discovered a software vulnerability that allows attackers to exploit the way applications respond to HTTP CONNECT requests.
August 9, 2016 POS Security: Experts Crack Credit Defenses, Offer Tips to Stay Safe 2 min read - POS security is a high-priority issue for users and retailers alike as cybercriminals continue to target Track 2 data at a high rate.
July 21, 2016 HTTPoxy Can Enable Man-in-the-Middle Attacks 2 min read - A 15-year-old scripting vulnerability known as HTTPoxy is exposing many Linux distributions and programming languages to man-in-the-middle attacks.
May 26, 2016 Stuck in the Middle: MitM Attacks Could Stem From Well-Intentioned WPAD Use 2 min read - Enterprises may have had lofty intentions for the use of the WPAD protocol, but the reality is that it could expose them to MitM attacks.
April 4, 2016 Major Programming Languages Fail to Detect Revoked TLS Certificate 2 min read - Identifying a revoked TLS certificate is impossible for versions of PHP, Python or similar languages because of faults in their underlying libraries.
January 11, 2016 New Year, New Problems: CMS Vulnerabilites Take on 2016 2 min read - Several vulnerabilities have recently been discovered — and patched — in CMS software WordPress and Drupal. What should users know about the risks?
December 22, 2015 Xmas Hit List: Three Security Vulnerabilities Unwrap Critical Risks 3 min read - A set of three critical security vulnerabilities may be opening the door for cybercriminals to attack enterprises during the holiday weeks.
December 3, 2015 Out of the Woodwork: Millions of Embedded Devices Found Sharing Security Data 2 min read - Embedded devices may be sharing information such as cryptographic keys — which leaves the door wide open for cybercriminals to steal this data.
August 7, 2015 Are Cloud File Sync Tools Out of Step With Security? 2 min read - File sync services are now at risk of man-in-the-cloud (MitC) attacks, putting critical information at risk. What's the threat level for corporate data?
Banking & Finance October 3, 2014 Online Banking Best Practices for Consumers 3 min read - As mobile and online banking grows in popularity, consumers are encouraged to take advantage of best practices and specialized software to stay secure.