Security News

A vulnerability in the popular secure remote access software OpenSSH can be exploited by attackers to try to brute-force their way into the connection and access Internet-facing computers and/or serve...

Security researcher Stefan Esser has revealed the existence of a privilege escalation vulnerability affecting OS X 10.10 (Yosemite), and has provided a working proof of concept local exploit that inst...

Google researchers have asked 231 security experts and 294 web-users who aren’t security experts about their security best practices, and the list of top ones for each group differs considerably: ...

Smartwatches with network and communication functionality represent a new and open frontier for cyberattack, according to HP. They found that 100 percent of the tested smartwatches contain significant...

BalaBit and Silent Signal today announced that registration is now open for the eCSI Hacker Playground. The hacker challenge is a global online competition, specially designed for the Black Hat USA 20...

We have seen a concerning pattern in the recent data breaches, including the breach at the Internal Revenue Services (IRS) and other US government agencies in that the primary target was Social Securi...

A ThreatTrack security survey of C-level executives at U.S. enterprises employing a CISO found that despite a rash of high-profile data breaches in the last year, many in the C-suite still fail to ful...

The global managed security services market is expected to reach $29.9billion by 2020, registering a CAGR of 15.8% during 2014-2020, according to Allied Market Research. The cloud-based managed sec...

