LAS VEGAS. Guests in hotels around the world make use of magnetic stripe-based key cards to gain access to their rooms. According to Weston Hecker, senior security engineer and pentester…
The use of cryptographic keys is a linchpin of modern security. When it comes to the cloud, there is some debate as to where those keys should exist and how…
Security is a requirement for modern organizations that must protect their technology assets and corporate data against attacks. But what impact does security have on users within organizations? That’s one…
Chris Roberts has been in the news a lot this week, for all the wrong reasons. Roberts was banned from United Airlines after tweeting on a flight about his theoretical…
In the modern post-Snowden world, the idea that we’re all constantly being watched is not as farfetched as it once was. But how does an individual who thinks they are…
Software-as-a-service (SaaS) applications offer organizations convenience and constant feature refreshes without the need to install and deploy software on-premises. But SaaS also brings a host of security concerns that could…
Look at any recent security update from Microsoft, Google or Mozilla and you will find use-after-free memory errors. These vulnerabilities enable attackers to take advantage of allocated memory after it…
SQL injection has become the scourge of the Internet era. Year after year, it is cited as one of the top security vulnerabilities on the Internet, responsible for countless data…
Apple updated its OS X desktop and server operating systems this week with the 10.9 Mavericks release. Mavericks includes over 200 new features and a long list of security…
Get the free newsletter
Subscribe to Cybersecurity Insider for top news, trends & analysis