- Apple pulls the plug on in-app ad-blockers
- Comcast Xfinity Home subscribers can now add Nest thermostats and other connected-home devices
- Apple removes apps from store that could spy on your data traffic
- Android phones patched once a year, 87 percent exposed. Which brand is the most secure?
- SaaS discovery tools target growing shadow-IT problem
Rapid7 - News, Features, and Slideshows
Rapid7 in pictures
A flaw in the widely used OpenSSL library could allow man-in-the-middle attackers to impersonate HTTPS servers and snoop on encrypted traffic. Most browsers are not affected, but other applications and embedded devices could be.
The first thing an IT security executive should do after the corporate network has been breached is fall back on the incident response plan that was put in place well before attackers got through the carefully constructed defenses.
A vulnerability in Android's default Web browser lets attackers spoof the URL shown in the address bar, allowing for more credible phishing attacks.
A critical vulnerability in code used by several virtualization platforms can put business information stored in data centers at risk of compromise.
The mystery high-severity flaw that people were expected to be fixed in OpenSSL is no Heartbleed, but it is serious and users should update.
- The role of chief digital officer: Destined to become redundant?
- ADMA bases new code of conduct on self-regulation and customer centricity
- Listen and act on customer data, not competitor intelligence, says Pandora MD
- ANZ CTO: Digital disruption is fundamental change accelerated
- Facebook 'Reactions' test adds six emojis to the Like button