Voting technology is going to be under a lot of pressure in less than a year. Are there enough security safeguards to protect these machines?
The team at Google's Project Zero has discovered 11 high-impact security issues in Galaxy S6 Edge devices, and Samsung is moving to patch quickly.
IBM Security Guardium Vulnerability Assessment can help solve a twofold problem faced by many enterprises: managing compliance and securing data.
Once news of the Joomla security flaw was made public, cybercriminals didn't waste any time trying to strike against vulnerable websites.
The Internet of Things (IoT) comes with inherent risk. The newest threat is a series of vulnerabilities in a set of power analysis tools.
Maximizing Effectiveness of Your Application Security Testing Program With Cognitive Intelligent Finding Analytics
Your application security testing program can be improved with the addition of cognitive learning strategies such as fixed-point analysis.
The makers of Joomla have moved quickly to patch a hole that allowed cybercriminals to execute SQL injection attacks in the content management system.
Security experts and developers have just under three months to potentially earn up to $15,000 in Microsoft's latest bug bounty program.
Vulnerabilities in the Internet's Network Time Protocol could lead to cybercriminals successfully executing attacks on unsuspecting organizations.
Mozilla is moving up the end date for vulnerable SHA-1 certificates, prioritizing security above convenience for millions of websites.