August 26, 2016 BTS Stations Are at Risk, Researchers Find 2 min read - BTS stations that run on the most popular open source BTS software are vulnerable to cyberattacks because they share the same transceiver code base.
August 1, 2016 Mobile Security News Roundup: Top Stories From July 2 min read - It has been an eventful July for mobile security, with news regarding "Pokemon Go," smartwatches, IBM MaaS360's ISO 27001 certification and more.
July 21, 2016 HTTPoxy Can Enable Man-in-the-Middle Attacks 2 min read - A 15-year-old scripting vulnerability known as HTTPoxy is exposing many Linux distributions and programming languages to man-in-the-middle attacks.
Software Vulnerabilities July 7, 2016 Remote Code Execution in Xiaomi MIUI Analytics 3 min read - The IBM X-Force AppSec Research Team has discovered a remote code execution (RCE) vulnerability in MIUI, the flavor of Android developed by Xiaomi.
February 1, 2016 Fair Warning: HTTP Password Requests Flagged by Firefox 2 min read - Browsers are fighting back against unsecure HTTP pages by blocking password requests from such websites, which could result in a more secure Internet.
Endpoint November 10, 2015 Are Attackers Out-collaborating You on Mobile Application Security? 3 min read - Strong mobile application security needs to be a part of your organization's overall security posture if you want to uncover vulnerabilities.
October 7, 2015 Research Shows How a Webmail Server Like OWA Could Offer an Opening to Cybercriminals 2 min read - A webmail server vulnerability affecting Microsoft's Outlook Web Access may provide cybercriminals with an entry point into corporate networks.
Malware September 10, 2015 An Overnight Sensation — CoreBot Returns as a Full-Fledged Financial Malware 6 min read - CoreBot's developers have evolved the malware into a full-fledged banking Trojan that executes a variety of attacks to steal victims' bank credentials.
August 11, 2015 Subpar SOAP? Why Your Windows Update Might Be Dirty 2 min read - Any Windows update could now be dirty thanks to subpar SOAP settings used by some companies that leave them open to vulnerability exploitation.
August 7, 2015 Are Cloud File Sync Tools Out of Step With Security? 2 min read - File sync services are now at risk of man-in-the-cloud (MitC) attacks, putting critical information at risk. What's the threat level for corporate data?