A surge in 3-D printing vulnerabilities could leave the enterprise open to intellectual property theft or general process disruption.
The IBM X-Force AppSec Research Team has discovered a remote code execution (RCE) vulnerability in MIUI, the flavor of Android developed by Xiaomi.
The latest Microsoft cybersecurity initiative pushed for a more coordinated effort surrounding vulnerability disclosure and communication.
A series of old Microsoft vulnerabilities continues to cause problems in Microsoft Office products. Here's what users need to know.
A security researcher discovered that the Qualcomm-made chips at the center of Android encryption can be exploited in a sophisticated attack.
The endpoint protection of the future must be able to identify indicators of compromise, locate vulnerabilities and move to patch them quickly.
A security researcher at Google recently found more than two dozen severe Symantec vulnerabilities affecting several security products.
Vulnerabilities in a SAP HANA system can result in major consequences for users, but identifying and remediating these issues can be easy.
A savvy hacker may identify vulnerabilities that lead to memory attacks. Learn what contributes to these issues and best practices for avoiding them.
Application security practices and tools can help ensure that embarrassing and costly vulnerabilities are shut out of your website or app.