August 15, 2016 Linux Has a TCP Flaw, Researchers Find 2 min read - Researchers at the University of California, Riverside discovered a TCP flaw that has resided in the Linux implementation since 2012.
August 1, 2016 Mobile Security News Roundup: Top Stories From July 2 min read - It has been an eventful July for mobile security, with news regarding "Pokemon Go," smartwatches, IBM MaaS360's ISO 27001 certification and more.
Software Vulnerabilities July 14, 2016 Command Injection: A Deadly Needle in the Haystack 2 min read - Command injection attacks may not get a lot of hype, but they can be seriously damaging to an enterprise that isn't careful about its security.
July 13, 2016 ‘Pokemon Go,’ Popular New AR Game, Can Load Malware 2 min read - "Pokemon Go" can load rootkits into devices along with the hot game, which could wreak havoc on individual users and enterprise networks alike.
Advanced Threats July 8, 2016 3-D Printing Vulnerabilities: Build Your Own Breach? 3 min read - A surge in 3-D printing vulnerabilities could leave the enterprise open to intellectual property theft or general process disruption.
Software Vulnerabilities July 7, 2016 Remote Code Execution in Xiaomi MIUI Analytics 3 min read - The IBM X-Force AppSec Research Team has discovered a remote code execution (RCE) vulnerability in MIUI, the flavor of Android developed by Xiaomi.
July 7, 2016 Microsoft Cybersecurity Advocates for Coordinated Norms 2 min read - The latest Microsoft cybersecurity initiative pushed for a more coordinated effort surrounding vulnerability disclosure and communication.
July 6, 2016 Out of the Office? Not Quite — Old Microsoft Vulnerabilities Still Wreaking Havoc 2 min read - A series of old Microsoft vulnerabilities continues to cause problems in Microsoft Office products. Here's what users need to know.
July 6, 2016 Android Encryption Fails Thanks to Qualcomm Chips 2 min read - A security researcher discovered that the Qualcomm-made chips at the center of Android encryption can be exploited in a sophisticated attack.
Endpoint July 6, 2016 Adapting Your Defenses to the Attack: The Next Generation of Endpoint Protection 2 min read - The endpoint protection of the future must be able to identify indicators of compromise, locate vulnerabilities and move to patch them quickly.