October 27, 2015 New IoT Vulnerabilities Power Up Security Concerns 3 min read - The Internet of Things (IoT) comes with inherent risk. The newest threat is a series of vulnerabilities in a set of power analysis tools.
Application Security October 27, 2015 Maximizing Effectiveness of Your Application Security Testing Program With Cognitive Intelligent Finding Analytics 4 min read - Your application security testing program can be improved with the addition of cognitive learning strategies such as fixed-point analysis.
October 26, 2015 Joomla’s Latest Release Fixes SQL Injection Flaw That Put 2.8 Million Sites at Risk 2 min read - The makers of Joomla have moved quickly to patch a hole that allowed cybercriminals to execute SQL injection attacks in the content management system.
October 23, 2015 Microsoft Will Pay up to $15,000 for Security Flaws in Bug Bounty Program 2 min read - Security experts and developers have just under three months to potentially earn up to $15,000 in Microsoft's latest bug bounty program.
October 23, 2015 How the Kiss O’Death Packet and Other NTP Vulnerabilities Could Turn Back the Internet’s Clocks 2 min read - Vulnerabilities in the Internet's Network Time Protocol could lead to cybercriminals successfully executing attacks on unsuspecting organizations.
October 22, 2015 Mozilla Talks Moved-Up End Date for SHA-1 Certs 2 min read - Mozilla is moving up the end date for vulnerable SHA-1 certificates, prioritizing security above convenience for millions of websites.
October 21, 2015 Why Diffie–Hellman Encryption May Be Past Its Prime 2 min read - The Diffie–Hellman key exchange has been the standard in encryption for a long time, but it may be time to move on to more advanced protection.
October 15, 2015 October’s Patch Tuesday: No Treats, Just Big Security Tricks 2 min read - October's Patch Tuesday has come and gone. Here's what you should know about what was updated — and why you shouldn't delay downloading these fixes.
Security Services October 14, 2015 Connecting the Dots: Experiences in Real-Life IT Security Incident Handling 2 min read - A recently published report describes attack scenarios, the circumstances leading to an incident and the countermeasures that could have prevented it.
October 7, 2015 Research Shows How a Webmail Server Like OWA Could Offer an Opening to Cybercriminals 2 min read - A webmail server vulnerability affecting Microsoft's Outlook Web Access may provide cybercriminals with an entry point into corporate networks.