The chaos of Black Hat is just like the chaos of the information security industry. How can one decide which security company to partner with?
Black Hat 2014 illuminated the vulnerabilities of the Internet of Things, according to two IBM researchers who attended the conference.
Blackphone offers a robust security and privacy suite, which is handy for sophisticated users but not a complete solution for all mobile users.
The IBM Security X-Force Research team has uncovered a serious vulnerability that affects many Android applications built on the Apache Cordova platform.
When selecting an Information Technology (IT) vendor, it is important to consider what the vendor does to mitigate security vulnerabilities.
Getting application security vulnerabilities under control is harder than it sounds. Follow these four steps to help your company get started.
Trusteer security research team identified a series of attacks carried out by a new ZeuS.Maple variant that targets customers of leading Canadian banks.
How Security Intelligence and Incident Forensics enable security operations teams to quickly find malicious attackers.
Recently Trusteer researchers discovered a new Trojan that has been targeting more than 450 financial institutions around the world, mainly in the US, UK and Australia. The new Trojan which seems to be a variant of the well-known Zeus Trojan (aka...
Analysis of Recent Struts Vulnerabilities in Parameters and Cookie Interceptors, Their Impact and Exploitation
An analysis of the recent Struts vulnerabilities in parameters and Cookie Interceptors, their impact and one possible way to exploit them.