Cardiac Exsanguination: a Heartbleed damage round-up
Two months have passed since the Heartbleed disclosure. Now it is time for a round-up: What damage did it inflict and what can we expect?
58 articles
Two months have passed since the Heartbleed disclosure. Now it is time for a round-up: What damage did it inflict and what can we expect?
First ever SMS Android Trojan in U.S., update on OpenSSL Heartbleed, Apple fixes SSL vulnerability in iOS and OSX, AOL Hacked, and Iowa State Bitcoin Mining.
The OpenSSL Heartbleed bug that could expose passwords, communications, and encryption keys continues to dominate news headlines across the security industry
There is one somewhat positive outcome from the ongoing #heartbleed scare: the password security issue is back in focus. How big is the ‘adventure’ of changing all passwords going to be?
The Heartbleed bug was huge news last week and still is. As a hobbyist programmer, I am saddened that attention to the art of software-making was brought on as a
We put too much trust in the Internet. And we need to understand that security products and solutions should compliment a secure mindset.
Headlines dominated by just two stories this week: a seriously widespread crypto bug known as Heartbleed and Microsoft’s end of security support for Windows XP
There is a serious flaw called Heartbleed in OpenSSL encryption library that could expose user login credentials, communications content, an more
As reported yesterday, security researchers have found a nasty bug in OpenSSL, which allows reading the memory of systems protected by the vulnerable versions of the OpenSSL software. This effectively
A vulnerability affecting all versions of Windows since Windows 2000 through Windows 10 might have been discovered. It’s still uncertain, however.
Shodan and Censys are the search engines for the Internet of Things and this duo is capable of wreaking havoc in a lot of different ways
Konstantin Goncharov recaps the most significant security events of 2015.
Quantum computers are said to be coming soon. They will definitely change the information security paradigm. How you can prepare to this shift?
Three most important recent news with extensive commentary and trolling: nasty Android Stagefright vulnerability, new car hacks and Do Not Track 2.0 privacy initiative
Much has been said about the VENOM vulnerability, which is part of the new-age phenomena of Virtualization.
Today we discuss the most important news on information security from January.
In this talk security podcast, Chris Brook and Brian Donohue discuss the upcoming Security Analyst Summit, Flash zero days, the Ghost vulnerability and the Anthem breach
As part of its Project Zero security initiative, Google disclosed a few vulnerabilities in Windows, some ahead of a planned patch. Google simply adhered to its “publicize in 90 days after private vendor disclosure” policy, but where are end users’ interest in this “game of flaws”?
There are various ways to assess the threat landscape, but it’s what companies think of it that is most important. We decided to pick the top 10 events of 2014 by a single criterion: the popularity of the corresponding stories. And here is what we came up with.
We collected the 10 best tweets related to an IT security event in 2014.
2014 is over, as are the holidays. Time to look back at the business security highlights of past the year.