Bug poaching may not feel as severe as full-blown advanced attacks that expose your data to the public, but you should treat them just as seriously.
To better prevent command injection attacks, developers need to learn how to think like a hacker and identify weak points in software.
Users should pay particular attention to recent Patch Tuesday updates, which will fix several critical vulnerabilities in Windows products.
Hackers frequently use SQL injection as a means of attacking and taking over databases. Here's what you need to know to avoid this type of breach.
Aruba Networks recently admitted to security flaws in its PAPI wireless network protocol — after a security researcher identified the issues.
Researchers attempt to find PoC exploits with good intentions, but that doesn't stop cybercriminals from taking advantage when they have the chance.
What does mom know about security? Probably more than we'd like to admit. Here are some of mom's favorite life lessons, security-style.
IBM BigFix has a fixlet available for corporate users looking to uninstall QuickTime for Windows, which was found to have serious vulnerabilities.
MIT a new has just introduced a new bug bounty program — with a few unique wrinkles. It's only open to the school community and doesn't pay out cash.
There has been a lot of news regarding OS X recently, and it runs the gamut from solid security progress to more alarming vulnerabilities.