To better prevent command injection attacks, developers need to learn how to think like a hacker and identify weak points in software.
Hackers frequently use SQL injection as a means of attacking and taking over databases. Here's what you need to know to avoid this type of breach.
IBM BigFix has a fixlet available for corporate users looking to uninstall QuickTime for Windows, which was found to have serious vulnerabilities.
QuickTime for Windows will soon be unsupported, and security researchers have identified at least two zero-day vulnerabilities that will not be patched.
A recent threat report from Symantec found that zero-day vulnerabilities were found about once a week in 2015, representing a big increase from 2014.
The Cisco ASA IKE buffer overflow is a critical vulnerability and requires a proactive response. Let's look at possible Cisco ASA remediation actions.
Traditional approaches to intrusion prevention are not as effective as they once were, and deep packet inspection is an attractive modern option.
Cybercriminals were reportedly going on a server hacking spree weeks after vBulletin patched a major vulnerability in its popular online forum software.
A recently published report describes attack scenarios, the circumstances leading to an incident and the countermeasures that could have prevented it.
Adobe recently issued a patch to address a vulnerability in its popular Flash Player. If not fixed, users could be the target of cybercriminals.