July 29, 2015 XSS Vulnerability Crossed Out in New WordPress Version 2 min read - WordPress update 4.2.3 crossed out a critical XSS vulnerability — the latest in a long line of flaws that put websites running the CMS at risk.
July 29, 2015 Break a Leg? New Android Vulnerability Takes Center Stage 2 min read - Native app StageFright is the newest Android vulnerability to come to light. How can users protect their mobile devices from the onslaught of threats?
July 24, 2015 Dyre Malware Is Spreading via Deadly Macros in Phony Payment Documents 2 min read - A security researcher says Bartalex malware may also contain the Dyre malware as well as the Pony loader, spreading malicious programs.
July 24, 2015 Can Tokenization Overcome the Biggest Concerns About Biometric Authentication? 2 min read - HYPR released a biometric authentication SDK that would let third parties overlay fingerprint and voice recognition over other security processes.
July 24, 2015 Bot Blacklist: Tech Heavyweights Look to Block the Bad Guys 2 min read - The Trustworthy Accountability Group (TAG) is creating a bot blacklist in collaboration with Google, Facebook and Yahoo. Can they win the war on ad fraud?
July 23, 2015 About 30,000 Instances of MongoDB Exposed on Web, Security Researcher Says 2 min read - Some 30,000 instances of MongoDB are accessible over the Internet because of a failure by database administrators to properly configure them.
July 22, 2015 GamaPOS Malware Extends Reach With Andromeda Botnet 2 min read - Point-of-sale malware GamaPOS is looking for greater reach by leveraging the popular Andromeda botnet. But what's the risk factor?
July 22, 2015 NOMORE Attack Method Shows RC4 May No Longer Be a Reliable Way to Encrypt Data 2 min read - Researchers say it may be time to look beyond the RC4 algorithm to secure Web connections after they discovered an attack method called NOMORE.
July 21, 2015 Microsoft Can’t Protect You Any Longer: Keep Watch for Windows XP Malware 2 min read - After a long transition period, Microsoft has ended anti-malware protection for Windows XP, meaning users should move quickly to protect machines using it.
July 20, 2015 Breaking Up, Breaking In? Sensitive Data and the Ex-Employee 3 min read - Ex-employees aren't always cut off from corporate networks. How do companies ensure sensitive data is protected when users leave the fold?