Security | News, how-tos, features, reviews, and videos
Security by obscurity is real. Sucuri's CTO found that while IPv4 servers can get compromised in minutes, IPv6 servers are safe from attack because no one is looking for them
AppSecurity platform supports Java 8 protections and features without having to upgrade to Java 8
All those millions of new endpoints will add equally as many vulnerabilities if the industry fails to address the problem
The update is a serious and critical undertaking that will ensure greater DNS security
The denial-of-service flaw in BIND can be triggered by specially crafted DNS packages and is capable of knocking critical servers offline
Cross-site scripting attacks are all-too-common and Content Security Policy on most websites provide no security protection. Google's CSP Evaluator and CSP Mitigator tools address the configuration mistakes.
Users will receive an error when trying to access web servers that use weak Diffie-Hellman key exchange with weak keys
Single-tenant breaches can and do happen -- and it's usually IT's fault. Here's how to recover from one and prevent another
Project Springfield, which includes Microsoft's in-house testing technology for Windows and Office apps, uses whitebox fuzzing technology to sniff out flaws that could lead to crashes
There have also been 'scanning activities,' which could be preludes to attacks