On Tuesday, Microsoft patched over two dozen vulnerabilities across the Windows platform. At the same time, criminals started targeted a new vulnerability that has...
Researchers are warning organizations that a recently-fixed authentication vulnerability in MySQL is simple to exploit.The authentication bypass, called "tragically comedic" by Rapid7's HD Moore,...
Research from Trusteer shows that device fingerprinting, which is used in fraud detection systems, might be a useless layer of protection after they discovered...
Researchers at Trend Micro have discovered a malicious PowerPoint file circulating via email, which if executed, installs a backdoor on the victim’s system. The...
In an effort to help organizations develop mobile applications that have security baked-in from the start, IBM has announced a series of static application...
Following drama last month that started when Adobe said it would essentially force users to pay for an upgrade to address security vulnerabilities in...
Google Two-Factor Authentication Flaw Led to Breach at CloudFlare, Exposed Other Google Apps for Business CustomersLate last week, news broke that web security and...
Earlier this week, SecurityWeek reported on news that Cambridge University researchers discovered a backdoor on a field-programmable gate array (FPGA) chip used by the...
Wave Systems has signed a 15-year software license and distribution agreement with Samsung, enabling Samsung to bundle Wave’s EMBASSY Security Center (ESC) and TCG...
A cyberattack continues to affect the largest regulated water and wastewater utility company in the US, renewing a focus on the importance of protecting...