In July 2015, operations performance management company PagerDuty advised customers to change their passwords after discovering that its systems had been breached.
Hi, what are you looking for?
In July 2015, operations performance management company PagerDuty advised customers to change their passwords after discovering that its systems had been breached.
In traditional Warfare Theory, it is accepted that a defending force has an advantage over an attacker. However, in the Cyber Warfare Theory, the...
Target's breach should mark the watershed line of the enterprise's security.
Certificate Transparency Gives Hope That Trust in PKI and SSL Will be Redeemed...
Hackers looking to steal sensitive data, such as intellectual property, deal data or PII, know exactly where to find it: in the databases, file...
The root cause of many serious security incidents is some vulnerability in the implementation of the serialization-deserialization process. Just recently, such vulnerability was fixed...
In the current threat landscape, where cyber-criminals are increasingly using automation to carry out their attacks, an automatic security reaction seems to be inevitable,...
An exploit kit is a framework that automates the exploitation of client-side vulnerabilities, targeting browsers and programs that can be invoked through the browser....
Malicious automatic web application access is one of the most relevant dangers in the current web application’s threatscape. Automated tools can be used for...
Bitcoin’s wiki defines it to be “an experimental, decentralized digital currency”. As with any experimental system, if it proves to be successful then it...
Google is reported to have “declared war on the password”. While we all just hate passwords and "a quick tap on your computer with...
On the December 2012, an Egyptian hacker who calls himself ViruS_HimA claimed to have breached Yahoo!’s security systems and acquire full access to certain...
Last week, Ruby on Rails (RoR), a popular web application framework, was reported as vulnerable to critical vulnerabilities.
From hackers’ point of view, launching a successful attack, either malware based or through web application hacking, requires an investment in infrastructure. The infrastructure...
While Anti-Virus Solutions Are Effective in Fighting Widespread Malware, There is a Good Chance Newer Malware Will Evade Those Solutions.
Last week, South Carolina’s (SC) Governor presented the results of the investigation over the exposure of the personal data of nearly 4 million individual...
DKIM, or DomainKeys Identified Mail, is a protocol created to allow mail services to verify the authenticity of the mail messages they deliver.
Last week, Mozilla removed the latest version of their Firefox Web browser just a day after it was released. The reason? A security vulnerability...
Google has always had a sharp nose for rising Internet trends. Just recently, the search giant announced that it had acquired VirusTotal, an anti-malware...