According to data provided by Edward Snowden, the NSA’s infiltration efforts are quite widespread.
Google quashes a pair of bugs in 10 days after researcher creates a simple exploit to take advantage of a complex set of flaws.
Reports over the past several weeks have pointed to potential malware — a variation on the Shiz banking-related Trojan — …
Efforts at fake validation increased by 50 percent in one quarter; Android exploit count driven 33 percent by validation-avoiding malware.
The agency will pay $2 million to the first team that develops an automated system capable of self-generating patches for software vulnerabilities.
Some 95 percent of exploits are aimed at just five flaws; four of those are in Java.
Holes in IE and Windows get most of the attention, but Outlook and SharePoint are much more direct threats to the enterprise: analysts.
Studies show ‘shocking’ lack of awareness of threats, even among datacenter security pros.
Zero-day exploits can lurk for months in IT infrastructures before being discovered.
Don’t blame employees: IT and top managers carry at least as much blame for attacks.