Security News



The newest version (v4.5.1) of popular hypervisor Xen has been released last week, and includes a bucketload of improvements and bug-fixes, including nearly 20 security fixes. Patches for the vulne...

Attackers are exploiting a vulnerability in eBay's Magento platform to steal users' billing information (including payment card info), warns Sucuri Security's Peter Gramantik. Magento is one of the...

Here's a comprehensive document on migrating from SHA-1 to SHA-2 in Active Directory certificates....

The Internet of Things is here and is now on your wrist, in your pocket, in your car, and maybe even in your socks. From smart watches and self-driving cars to smart toothbrushes and digital socks tha...

It didn't take long for exploit kit authors to incorporate an exploit for the recently discovered zero-day Adobe Flash vulnerability (CVE-2015-3113) into their malicious wares. According to malwar...

Security issues and threats make you vigilant in your efforts to keep your company assets safe. Attend Intel Security FOCUS 15 (their 8th annual security conference) and get the tools you need to leve...

Most midsize business leaders view a data breach among their top risks and a majority consider IT security ‘very important’ when selecting a supplier. They have good reason to be concerned: 43 percent...

A device hi-jacked for the purpose of conducting ‘click-fraud’ can become a conduit for more serious malware such as ransomware. A Damballa study cited an example of how a compromised device, origi...