New Bash Bugs Surface
Time to patch again: Newly discovered flaws in Bash put Linux-based systems at risk.
Shellshocked: A Future Of ‘Hair On Fire’ Bugs
Most computers affected by Bash will be updated within 10 years. The rest will be vulnerable for the lifespans of all humans now living. This should concern us. But then, global warming should also concern us.
Malvertising Could Rival Exploit Kits
Spate of malvertising campaigns gain steam in recent months, including the Kyle and Stan network, which researchers now believe is nine times bigger than initially estimated.
Incident Response Fail
Fortune 500 companies with incident response teams and plans in place are pessimistic about their effectiveness amid a climate of data breach domination.
Are Directories The On-Premises Sacred Cow?
As a server orchestration startup reengineers itself into a directory-as-a-service play, the question is why the market hasn't moved to say goodbye to Active Directory and LDAP.
5 Top Tips For Outsourced Security
It's one thing to hire a third-party developer to build a mobile app. It's quite another to trust a pen tester, MSSP, or DDoS protection firm. But the fact is, the threat landscape is complex, and few organizations can keep security completely in house. Here's how to decide what to outsource and select and manage providers.
An AppSec Report Card: Developers Barely Passing
A new study reveals that application developers are getting failing grades when it comes to their knowledge of critical security such as how to protect sensitive data, Web services, and threat modeling.
7 Reasons To Love Passwords
Passwords are often ridiculed, but there are some reasons they should be your nearest and dearest authentication factor.
Meet The Next Next-Gen Firewall
Or at least the latest iteration of one of the oldest-running security tools that continues to evolve and transform with the times.
Worm Illuminates Potential NAS Nightmare
A researcher at Black Hat Europe hopes to demonstrate a homegrown, self-replicating worm to illustrate major threats to popular network-attached storage systems.
Why Email Is Worth Saving
What if an Internet-scale, federated policy, authentication, and enforcement framework for trusted email delivery were available? It is.
Franchising The Chinese APT
At least two different cyber espionage gangs in China appear to be employing uniform tools and techniques, FireEye finds.