Linguistic analysis can provide clues to help security analysts trace the source of a cyberattack, but the method is inconclusive on its own.
A security researcher discovered how to create malicious Apache modules, giving cyberattackers a new way to tap into and control web servers.
A bad data backup configuration recently exposed email spammers, gives security professionals an inside look at spam operations.
Google's announcement of the first-ever collision attack means the Secure Hash Algorithm 1 (SHA-1) is officially no longer secure.
The authors of the Sundown exploit kit leveraged research conducted by Texas-based security firm Theori to develop a PoC exploit.
IBM Research — Haifa recently developed a solution that acts like a moving target, randomizing files to safeguard against ROP attacks.
The mobile transformation of the enterprise is just beginning. And according to a new IBM study, mobile security is already a must-have for organizations.
IBM MSS X-Force researchers found that C99 webshell attacks are increasing, particularly against content management systems such as WordPress.
IBM X-Force researcher Igor Aronov examines some common techniques used by malware authors to complicate dynamic (automated) and static (manual) analysis.
We may still be years away from completely smart homes and cities, but a set of research projects may help better secure the Internet of Things (IoT).