The recent fix for a zero-day flaw in Microsoft Office appeared more than five months after Microsoft was privately alerted to the flaw, and followed months of it being exploited via in-the-wild attacks. Can Microsoft do better?
Today's enterprises support an assortment of end-user devices, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, and, of course, smartphones. Not only do employees
use a variety of form factors, but they run a variety of platforms on those devices, including:
Apple iOS and Apple...
WikiLeaks has released a second batch of CIA attack tools, dubbed Dark Matter, which includes malware designed to exploit Mac OS X and iOS devices. But Apple contends the attacks target vulnerabilities in its software that have long been patched, so users are not at risk.
Canadian authorities narrowly escaped a data breach by stopping an intrusion at the country's statistics agency. The cyberattack used a zero-day vulnerability in Apache Struts 2, which has now been patched.
A groundbreaking study from RAND Corporation quantifies the stakes around how zero-day software vulnerabilities get discovered and persist, bringing hard facts to bear on related - and contentious - debates surrounding vulnerability disclosure and public safety.
Confide, an encrypted messaging application, received a surge of attention after White House officials began using it for leaks. But a teardown of the app by two security firms revealed a raft of serious security issues.
CA Technologies has announced plans to snap up application security testing vendor Veracode for $614 million cash, to offer SaaS-based application security testing. The move signals that secure coding - and agile-inflected DevOps - is hot. But will it come in time to secure the internet of things?
The present government's move to demonetize currency has given an increased impetus to cashless and electronic transactions in the country. With digitization occurring across all spheres of life,
the common citizen is being increasingly incentivized to go digital with their financial transactions, which can...
With the current demonetization move and the emphasis on cashless transactions in India, the chances of cyber risk to the payments infrastructure are higher ever before. What then will be India's
stance going forward and how do business and practitioners need to respond to this risk? country like India and what are...
The cost upsides of writing code that's as free from bugs as possible has long been known, says Veracode's Chris Wysopal, but bugs continue to plague production code. Thanks to the rise of agile programming, however, there are new opportunities to eradicate flaws during development.
For too long, ensuring that code is securely written - and bug free - has been a business afterthought. But there's been new hope for building security into the development lifecycle, thanks to the rise of DevOps, aka rugged software, says Chris Wysopal, CTO of the application security firm Veracode.
Data security law continues to evolve. Enactment of the General Data Protection Regulation (GDPR), which takes effect May 25, 2018, will impose formal, new data security requirements on organizations with business operations in the European Union or handling data of EU citizens. Adoption of the new GDPR is motivating...
A researcher claims WhatsApp has dismissed his finding that there's a backdoor in the application that could allow attackers to unlock encrypted messages. But the controversy is more nuanced - and for most of us, much less threatening - than it might first appear.
Rajendra Pawar, chairman of NASSCOM's Cyber Security Taskforce, discusses how to build India as a global cybersecurity hub and develop a skilled workforce. He describes his vision for the next five years
Facebook says it hasn't seen ransomware spreading through its Messenger instant messaging platform despite recent reports from researchers saying that the file-encrypting Locky may have slipped through.