The number of cloud apps that are still vulnerable to POODLE is dropping, but that doesn’t mean companies should assume they are safe.
Browsing: Malware and Vulnerabilities
Tripwire, Inc. has announced the results of a consumer survey conducted on holiday shopping security practices by One Poll and Dimensional Research.
Brian A. McHenry of F5 Networks discusses how the ratification of both HTTP 2.0 (HTTP/2) and TLS 1.3 will disrupt the Internet in 2015.
ESET has analysed a widespread case of ransomware generally known as TorrentLocker, which started spreading in early 2014.
Michael Aminzade of Trustwave reflects on what organisations can do to help protect themselves from falling victim to a breach.
Sloan McKinney discusses how both the UK Government and private businesses are starting to take cyber security seriously.
Proofpoint, Inc. has released the first social media security study that exposes the security threats plaguing Fortune 100 social media accounts.
Carmine Clementelli, a security expert and manager with PFU, a Fujitsu Company, discusses what we know about the Guardians of Peace and the Sony hack.
PhishMe senior researchers Ronnie Tokazowski and Shyaam Sundhar announce the top three phishing scams of 2014.
Stephen Morrow, Head of Security Services at SQS, reminds us of how and why security is a crucial factor when developing software.