Using open-source components can put application security at risk, but the efforts of a partnership between IBM and Black Duck could change that.
Many people have heard of Tor, or The Onion Router, but how many actually know the details of this privacy tool and how it came to be?
One of the best ways to deal with vulnerabilities is to look at them in context, but you need security tools that can provide that context first.
The U.S. Industrial Control System Cyber Emergency Response Team (ICS-CERT) reported an increase in critical infrastructure incidents in FY2015.
Antivirus software has the potential to provide an attack surface for savvy cybercriminals — provided they can find any vulnerabilities in the tools.
Preventing zero-day exploits is a tall order, even with the help of regular security audits and penetration tests taking place within an organization.
Exploit kits using outdated versions of Adobe Flash and Acrobat are on the rise, and users must be aware of the malicious websites they connect to.
Smart TVs are a soft entry point for those intent on cybercrime, especially attackers who prey on a user's ignorance of IT security practices.
A set of three critical security vulnerabilities may be opening the door for cybercriminals to attack enterprises during the holiday weeks.
A security researcher has discovered that thousands of MongoDB databases are publicly exposed on the Internet, creating vulnerabilities for organizations.