A group of researchers discovered a flaw in the protocol used in telecommunications networks that could enable fraudsters to pursue at least 10 different types of 4G LTE attacks.
As data breaches gain public attention, vulnerability disclosure becomes an increasingly crucial part of the incident response process.
According to security firm Menlo, many popular websites are more vulnerable to internet security threats such as typosquatting and background attacks than their reputations would suggest.
Organizations are increasingly failing to secure internet-facing industrial control systems (ICS) that manage critical infrastructure, putting them at risk of ICS-specific malware.
Endpoint management and security is a daily battle. You need a solution that helps you discover, manage and secure your endpoints faster, more easily and more consistently.
Organizations around the world should take stock of the security lessons they learned in 2017 to set realistic, achievable goals for the new year.
The move to SAP Business Suite 4 SAP HANA requires a thorough security impact assessment that addresses external threats, governance, risk management and other factors to ensure a secure migration.
Wi-Fi Protected Access (WPA3), the updated version of the globally used wireless security protocol, is set to launch later this year to help boost network defenses.
IBM X-Force monitored major data breach trends throughout 2017 and gleaned key insights to help companies avoid headline-grabbing security incidents.
A newly discovered hardware vulnerability underscores a microprocessor flaw that could allow an attacker to read data from privileged kernel memory.