Security Monitoring Software | News, how-tos, features, reviews, and videos
Explore related topics
Core Security researchers found hard-coded credentials and other flaws in firmware used in a variety of IP video cameras
Moving intrusion detection and prevention systems to the cloud will help mitigate denial-of-service attacks, according to AWS's CISO
The flaws could allow attackers to execute commands with high privileges and read sensitive passwords stored on the product
Instawallet, which stores a person's Bitcoins, said it will refund some lower balances after its database was fraudulently accessed
Malware also uses other techniques to evade detection from several types of security products, FireEye researchers say
The research highlights the potential for abuse of poorly configured embedded systems
Companies should not assume that security products are implicitly secure, researcher says at the Black Hat security conference
China's foreign minister denied claims that the country supported cyber attacks
Hackers need only a single malicious link or email to crack your corporate security. These simple steps help keep phishing attacks at bay
The remote access malware used in both cases is connected to the same control server, Symantec researchers say