May 9, 2016 Friendly Warning: PoC Exploits Dial In on Social Media Channels 2 min read - Researchers attempt to find PoC exploits with good intentions, but that doesn't stop cybercriminals from taking advantage when they have the chance.
Intelligence & Analytics May 6, 2016 Does Mom Know Best About Internet Security? 2 min read - What does mom know about security? Probably more than we'd like to admit. Here are some of mom's favorite life lessons, security-style.
Endpoint April 29, 2016 It’s Time to Let Go of QuickTime for Windows 2 min read - IBM BigFix has a fixlet available for corporate users looking to uninstall QuickTime for Windows, which was found to have serious vulnerabilities.
April 26, 2016 Just in Time for Summer, MIT Slaps Down New Bug Bounty Program 2 min read - MIT a new has just introduced a new bug bounty program — with a few unique wrinkles. It's only open to the school community and doesn't pay out cash.
April 21, 2016 OS X Roundup: The Good, the Bad and the Ugly 2 min read - There has been a lot of news regarding OS X recently, and it runs the gamut from solid security progress to more alarming vulnerabilities.
April 15, 2016 Uninstall QuickTime for Windows Now 2 min read - QuickTime for Windows will soon be unsupported, and security researchers have identified at least two zero-day vulnerabilities that will not be patched.
April 15, 2016 New Report Finds Zero-Day Vulnerabilities Increased in 2015 2 min read - A recent threat report from Symantec found that zero-day vulnerabilities were found about once a week in 2015, representing a big increase from 2014.
March 21, 2016 The Five Percent: HTTPS Redirects Under Threat Thanks to Slow HSTS Adoption 2 min read - Shifting to HTTPS is vital for websites, but many organizations are not implementing it properly and leave users at risk as a result.
March 14, 2016 Research Finds Libotr Can Be Exploited Remotely 2 min read - Researchers recently discovered that libotr is vulnerable, so secure instant messaging apps such as Pidgin, ChatSecure, Adium and others are at risk.
Cloud Security March 3, 2016 Security Challenges in the Cloud Environment 4 min read - Many enterprises are turning to the cloud for better availability and storage, but there are a number of threats that can put those environments at risk.