Software Vulnerabilities January 21, 2016 Is Your Antivirus Software Vulnerable to Attack? 3 min read - Antivirus software has the potential to provide an attack surface for savvy cybercriminals — provided they can find any vulnerabilities in the tools.
Advanced Threats January 18, 2016 The Disconnect Between Zero-Day Exploits and Security Audits and Penetration Tests 2 min read - Preventing zero-day exploits is a tall order, even with the help of regular security audits and penetration tests taking place within an organization.
January 11, 2016 Mutated Exploit Kits Arrive for the New Year 2 min read - Exploit kits using outdated versions of Adobe Flash and Acrobat are on the rise, and users must be aware of the malicious websites they connect to.
December 30, 2015 Cybercrime Has a New Entry Point: Smart TVs 2 min read - Smart TVs are a soft entry point for those intent on cybercrime, especially attackers who prey on a user's ignorance of IT security practices.
December 22, 2015 Xmas Hit List: Three Security Vulnerabilities Unwrap Critical Risks 3 min read - A set of three critical security vulnerabilities may be opening the door for cybercriminals to attack enterprises during the holiday weeks.
December 21, 2015 MongoDB Databases May Be Exposed by Security Misconfigurations 2 min read - A security researcher has discovered that thousands of MongoDB databases are publicly exposed on the Internet, creating vulnerabilities for organizations.
December 1, 2015 All Patched Up: Software Catches a Break Over Holiday Weekend 2 min read - Lenovo, LinkedIn and Zen Cart addressed serious software flaws during the holiday weekend, but now users can rest assured that vulnerabilities are patched.
Government November 16, 2015 Old Voting Tech Puts 2016 Election at Risk — Time for a Veto? 3 min read - Voting technology is going to be under a lot of pressure in less than a year. Are there enough security safeguards to protect these machines?
November 5, 2015 Google’s Project Zero Discovers 11 Security Issues in Galaxy S6 Edge 2 min read - The team at Google's Project Zero has discovered 11 high-impact security issues in Galaxy S6 Edge devices, and Samsung is moving to patch quickly.
Data Protection November 2, 2015 From Compliance to Breaches: Managing Data Source Vulnerabilities Is a Big Challenge 3 min read - IBM Security Guardium Vulnerability Assessment can help solve a twofold problem faced by many enterprises: managing compliance and securing data.