Discouraging Customers from Reporting Vulnerabilities by Reverse Engineering Code

You may have seen the news that Oracle shared a blog post (cache version here – Oracle took it down) in which the CISO essentially told the world to not help them make their software better, that the world should trust them to do it.Chris explains how they are violating license agreements by reverse engineering […]
Discovering an Unusual ATM Skimming Device in Mexico

A new story about fraud experts in Mexico who have discovered an unusual ATM skimming device that can be inserted into the mouth of the cash machine’s card acceptance slot and used to read data directly off of chip-enabled credit or debit cards. John Gunn, VP at VASCO Data Security commented on the chip card […]
Microsoft Issued Patch Tuesday Update

Microsoft issued its monthly Patch Tuesday update, with nearly half of its 14 security bulletins addressing vulnerabilities in its newest operating system, Windows 10. Two of the four “critical” vulnerabilities impact Windows, while one primarily affects the company’s Office offerings.Security experts at Tripwire think of the severity of this month’s Patch Tuesday update. Craig Young, […]
New Phishing Server Helps You to Defeat Hackers

Web-based Solution Helps Find Security Weakest Links to Prevent Phishing, Malware and Drive-By Attacks To find the weakest security link in your organization, you need to think like a hacker. Thanks to a new phishing solution called LUCY, companies can now measure and improve awareness towards phishing, malware and drive-by attacks by launching their own […]
How to Stop an Internet of Things (IoT) Car from being Hijacked

From tooth brushes that can schedule checkups with dentists to yoga mats that can analyze poses in real-time, one thing is abundantly clear—we are entering a new era of connected devices. Collectively referred to as the Internet of Things (IoT), Gartner predicts that the number of Internet-connected devices will rise to more than 25 billion […]
75% of Hackers Say Privileged Accounts are Just as Easy to Compromise as they were two Years Ago

Thycotic Black Hat 2015 Hacker Survey also finds 94% of hackers have found privileged account credentials in unprotected files Thycotic, a provider of smart and effective privileged account management solutions for global organizations, announced the results of a survey of 201 white hat and black hat hackers at Black Hat USA 2015. The survey, which was […]
Hacking of Carphone Warehouse

Carphone Warehouse has been hacked and the personal details of 2.4 million customers may have been accessed. Up to 90,000 customers may also have had their encrypted credit card details accessed. Security Experts from Lieberman Software, Imperva and ESET provide insight and tips for affected customers. Philip Lieberman, CEO of Lieberman Software : “This is an excellent […]