2 min read - BTS stations that run on the most popular open source BTS software are vulnerable to cyberattacks because they share the same transceiver code base.
2 min read - It has been an eventful July for mobile security, with news regarding "Pokemon Go," smartwatches, IBM MaaS360's ISO 27001 certification and more.
2 min read - A 15-year-old scripting vulnerability known as HTTPoxy is exposing many Linux distributions and programming languages to man-in-the-middle attacks.
3 min read - The IBM X-Force AppSec Research Team has discovered a remote code execution (RCE) vulnerability in MIUI, the flavor of Android developed by Xiaomi.
2 min read - Browsers are fighting back against unsecure HTTP pages by blocking password requests from such websites, which could result in a more secure Internet.
3 min read - Strong mobile application security needs to be a part of your organization's overall security posture if you want to uncover vulnerabilities.
2 min read - A webmail server vulnerability affecting Microsoft's Outlook Web Access may provide cybercriminals with an entry point into corporate networks.
6 min read - CoreBot's developers have evolved the malware into a full-fledged banking Trojan that executes a variety of attacks to steal victims' bank credentials.
2 min read - Any Windows update could now be dirty thanks to subpar SOAP settings used by some companies that leave them open to vulnerability exploitation.
2 min read - File sync services are now at risk of man-in-the-cloud (MitC) attacks, putting critical information at risk. What's the threat level for corporate data?
Analysis and insights from hundreds of the brightest minds in the cybersecurity industry to help you prove compliance, grow business and stop threats.