August 26, 2015 LG, Samsung Phones at Risk of Certifi-gate Android Vulnerability 2 min read - A new Android vulnerability has come into the spotlight, causing some Samsung and LG smartphone users to think twice about their authentications.
August 25, 2015 Reality Bites: Virtualization Increases Cost of Security Breaches 2 min read - A new study reports that virtualization can significantly increase the cost of recovery after a security breach. Is this the new reality?
August 25, 2015 The Ashley Madison Security Breach: An Affair to Remember? 2 min read - The Ashley Madison security breach has everyone talking, but what's the takeaway from this affair for corporations looking to improve cybersecurity?
August 25, 2015 Amazon to Disable Flash Player in Hosted Ads 2 min read - Amazon is prohibiting ads using Flash Player for its site, which may be the final straw for organizations concerned about ongoing security risks.
August 21, 2015 Why Security Is Becoming a Big Piece of the IT Outsourcing Market 2 min read - A new report from Computer Economics indicated that organizations are devoting larger portions of their budgets to IT outsourcing.
August 20, 2015 Research Shows DDoS Attack Volumes Doubling as Threat Vectors Proliferate 2 min read - Cybercriminals are using everything from home routers and WordPress plugins to legacy directory services to launch a DDoS attack, new research shows.
August 20, 2015 LinuxCon: CII Program Will Give Badges to Open Source Projects With Strong Security 2 min read - Open source projects have gotten a bad rap in security circles thanks to Heartbleed and other flaws, but an industry consortium may change that.
August 19, 2015 SCADA System Vulnerabilities Put Industrial Control Sector on High Alert 2 min read - Two weeks after vulnerabilities were revealed at DEF CON, a major piece of SCADA software remains unpatched, ICS-CERT has warned.
August 18, 2015 New BitTorrent DRDoS Attacks Amp Up Risk, Researchers Warn 2 min read - New BitTorrent distributed reflective denial-of-service (DRDoS) vulnerabilities are making noise across the net. Here's a rundown on the amped-up attacks.
August 18, 2015 Insecure Configuration of MongoDB, Other Databases Could Be Leaking Information 2 min read - A recent report suggested poor configurations of MongoDB, Redis and similar database products may be exposing data to cybercriminals.