The Latest in IT Security

1

The recently discovered vulnerability involving fax lines on HP multi-function devices, termed Faxploit, are a reminder of the importance of fundamental security practices. I did something a few weeks ago I rarely do: ignore a report about a significant vulnerability. Check Point Software released a very detailed analysis about the possibility of a network being […]

Read more ...

1

Cybercriminals’ interest in IoT devices continues to grow: in H1 2018 we picked up three times as many malware samples attacking smart devices as in the whole of 2017. And in 2017 there were ten times more than in 2016. That doesn’t bode well for the years ahead. We decided to study what attack vectors […]

Read more ...

1

In this podcast recorded at Black Hat USA 2018, Tim White, Director of Product Management, Policy Compliance at Qualys, talks about the importance of incorporating inaccessible or sensitive asset data into your overall vulnerability and compliance program. Here’s a transcript of the podcast for your convenience. Hello, my name is Tim White. I’m director of […]

Read more ...

1

The number of reported Common Vulnerabilities and Exposures (CVE) is rapidly growing. In fact, more than 11,000 vulnerabilities have been reported so far this year. Common vulnerabilities are relatively easy for researchers and malicious actors to find, which is why we commonly see major breaches resulting from security issues that already have CVE numbers assigned […]

Read more ...

Categories

FRIDAY, SEPTEMBER 21, 2018

Featured

Archives

Latest Comments

Social Networks