Application Security February 9, 2017 SAP HANA Security Evolution, From SPS08 to Now 3 min read - The SAP HANA security evolution started in 2011, peaked in 2014 and continues to deliver critical enhancements to provide analysts with greater visibility.
February 7, 2017 XP Lives On as an ATM Operating System in India 2 min read - Windows XP, which hasn't been updated since 2014 and contains many well-known vulnerabilities, is the most common ATM operating system in India.
January 18, 2017 Attacks on Embedded Open Source Code Could Rise by 20 Percent This Year 2 min read - Researchers from Black Duck Software expect the rate of attacks against known vulnerabilities in open source code to increase by 20 percent in 2017.
Software Vulnerabilities January 17, 2017 Going Inside an Arbitrary Kernel Write Vulnerability in the Nexus 9 (CVE-2016-3873) 3 min read - The IBM X-Force Application Security Research Team discovered an arbitrary write vulnerability in Nexus 9's kernel, putting application data at risk.
January 12, 2017 New PoC Exploit Weaponizes Security Research 2 min read - The authors of the Sundown exploit kit leveraged research conducted by Texas-based security firm Theori to develop a PoC exploit.
Software Vulnerabilities January 5, 2017 Android Vulnerabilities: Attacking Nexus 6 and 6P Custom Boot Modes 4 min read - X-Force researchers disclosed several Android vulnerabilities that could enable cybercriminals to use custom boot modes to take over Nexus 6 and 6P modems.
January 4, 2017 Travel Booking Systems Security Suffers From Old Mindsets 2 min read - A team of researchers exposed gaps in booking systems security at a recent conference in Germany and encouraged GDS providers to upgrade their systems.
December 30, 2016 Potentially Devastating PHP Vulnerabilities Discovered and Patched 2 min read - Security specialists have unearthed three PHP vulnerabilities that could have had serious consequences for organizations and consumers alike.
Retail December 22, 2016 Attackers Targeting Retail Are Shopping for Low-Hanging Fruit 2 min read - A recent IBM study revealed that many high-profile attacks against retail companies originate from vulnerabilities classified as low-hanging fruit.
Endpoint December 8, 2016 How to Find and Remediate Vulnerabilities in Real Time 2 min read - IT managers should take advantage of the many resources available to help them monitor, manage and ultimately remediate vulnerabilities.