Purdue University and Princeton University researchers have developed a device, called MedMon, which is designed to protect wireless medical devices such as pacemakers and insulin pumps from hacking...
According to KrebsOnSecurity's Brian Krebs, a 2010 FBI cyber intelligence bulletin reported that cyber attacks on smart meters have already cost a single electric utility in Puerto Rico, the Puerto ...
Over the past six years, high-definition videoconferencing systems have become increasingly ubiquitous in corporate boardrooms and meeting rooms. The benefits of videoconferencing – productivity ga...
An unidentified scammer managed to convince Well Fargo Bank to transfer $2.1 million to him from Catholic Healthcare West's bank account."The brazen theft was pulled off ingeniously, but the bigges...
Symantec (NASDAQ: SYMC) is rolling out a new platform called O3 Cloud Identity and Access Control to help enterprises better control their employees' access to the cloud. With a general availability...
SSL certificates are cornerstone security elements for many enterprises. Yet new research shows that few organizations have deployed effective processes for securely managing those certificates.A st...
Hackers recently published user account information from adult Web site YouPorn."According to security blogger Anders Nilsson, the email addresses, passwords and birthdates of over one million users...
Do you manage a Facebook Page for your business or organization? If so, you're probably aware that many of the same security issues that plague personal profiles also apply ...
For years, security researchers have used the terms "black box" and "white box" to describe dynamic and static web application security analysis, respectively. IBM is now seeking to combine the best...
Exploits that take advantage of SQL Injection (SQLi) vulnerabilities in software are among the most dangerous and prevalent attacks on the Internet today.In a SQLi attack, hackers typically take adv...