October 30, 2015 MySQL Users: Watch Out for DDoS Attacks Via Chikdos Malware 2 min read - Security researchers warned that the Chikdos malware is making a comeback, helping cybercriminals launch DDoS attacks against MySQL servers.
October 28, 2015 Cybercriminals Exploit Joomla Security Flaw Before Webmasters Upgrade Their CMS 2 min read - Once news of the Joomla security flaw was made public, cybercriminals didn't waste any time trying to strike against vulnerable websites.
October 28, 2015 XX or XY? Cyber Study Says Gender and Skills Gap Widening 3 min read - A recent study revealed that both the gender divide and skills gap are growing within the field of cybersecurity. How can enterprises fix this problem?
October 27, 2015 New IoT Vulnerabilities Power Up Security Concerns 3 min read - The Internet of Things (IoT) comes with inherent risk. The newest threat is a series of vulnerabilities in a set of power analysis tools.
October 26, 2015 Joomla’s Latest Release Fixes SQL Injection Flaw That Put 2.8 Million Sites at Risk 2 min read - The makers of Joomla have moved quickly to patch a hole that allowed cybercriminals to execute SQL injection attacks in the content management system.
October 23, 2015 Microsoft Will Pay up to $15,000 for Security Flaws in Bug Bounty Program 2 min read - Security experts and developers have just under three months to potentially earn up to $15,000 in Microsoft's latest bug bounty program.
October 23, 2015 How the Kiss O’Death Packet and Other NTP Vulnerabilities Could Turn Back the Internet’s Clocks 2 min read - Vulnerabilities in the Internet's Network Time Protocol could lead to cybercriminals successfully executing attacks on unsuspecting organizations.
October 22, 2015 DMARC Your Calendar: Google, Yahoo Send Spam Packing 2 min read - Email services such as Google and Yahoo are joining the DMARC movement in order to cut down on the sophisticated spam that continues to plague users.
October 22, 2015 Mozilla Talks Moved-Up End Date for SHA-1 Certs 2 min read - Mozilla is moving up the end date for vulnerable SHA-1 certificates, prioritizing security above convenience for millions of websites.
October 21, 2015 Why Diffie–Hellman Encryption May Be Past Its Prime 2 min read - The Diffie–Hellman key exchange has been the standard in encryption for a long time, but it may be time to move on to more advanced protection.