Please turn on your JavaScript for this page to function normally.
70% of finance apps vulnerable to input validation attacks

A growing number of data breaches and security incidents can be directly linked to poor code quality, according to CAST. The data reveals finance and retail industry …

10 most significant software security design flaws

The IEEE Center for Secure Design, a cybersecurity initiative focused on the identification of software design flaws, released a report based on real-world data collected and …

Why every security-conscious organization needs a honeypot

You’ve probably heard the phrase about “canaries in a coal mine.” In the mid 1900s, a guy named John Haldane figured out that birds die pretty quickly when …

Former HHS cyber security director convicted for child porn

The former acting director of cyber security at the U.S. Department of Health and Human Services was convicted by a federal jury in the District of Nebraska of engaging in a …

470 million sites exist for 24 hours, 22% are malicious

Blue Coat researchers analyzed more than 660 million unique hostnames requested by 75 million global users over a 90-day period. They found that 71 percent of the hostnames, …

More students bringing mobile devices to class

Just like professionals, more and more students are taking their own devices with them. BYOD, a trend in the business world, is also gaining popularity in schools. With …

NYU launches largest cyber security student contests

Even before the academic semester starts, students from across the globe have begun registering for the largest set of student cyber security competitions in the world: the …

8 ways to talk security with executive management

The importance of information security and technology risk management continues to grow, but many risk and security professionals continue to struggle with non-IT executive …

Identity theft vendor sentenced to 100 months in prison

A northern California man who served as an information and document vendor in the identity theft and credit card fraud ring known as Carder.su was sentenced yesterday to serve …

D-Link releases DWL-8610AP Wi-Fi AP with security features

D-Link announced the DWL-8610AP, a new high power, 802.11ac unified wireless access point. Rich with advanced radio management and security features, it allows IT …

Week in review: Securing networks in the IoT era, and taking control of Android app permissions

Here’s an overview of some of last week’s most interesting news, podcasts, interviews and articles: Breaking the security of physical devices In this podcast …

Sneak attack through smartphone shared memory

A weakness believed to exist in Android, Windows and iOS operating systems could be used to obtain personal information from unsuspecting users, research at the University of …

Don't miss

Cybersecurity news