Checkmarx explains how the Game of Hacks bridges the gap between app developers’ coding abilities and their security literacy.
Browsing: Malware and Vulnerabilities
32 percent of respondents who share an Internet-enabled device do not take any precautions to protect their data, says Kaspersky Lab.
techUK and Home Office identify the top 10 online vulnerabilities for 2014.
Research by Wombat Security Technologies and the Aberdeen Group shows that organizations can reduce the risk of a breach by implementing security education.
A new report from the Ponemon Institute reveals that enterprises spend $1.3 million a year dealing with false positive cyber security alerts.
Cytegic discusses how if companies today perform a ‘provocative’ action, they might face a cyber-reaction from hackers and specifically hacktivists.
An infographic demonstrates how a number of different web browsers compare in terms of security.
Websense Security Labs discusses how Nuclear Pack, one of the most popular exploit kits, has evolved.
Trey Ford, Global Security Strategist at Rapid7, offers some clarity on the discovery of the Skeleton Key malware.
Ken Westin and Craig Young, security experts with Tripwire, comment on the new “Hidden” MasterCard recently announced at CES.