Rapid7 - News, Features, and Slideshows
Rapid7 in pictures
A flaw in the widely used OpenSSL library could allow man-in-the-middle attackers to impersonate HTTPS servers and snoop on encrypted traffic. Most browsers are not affected, but other applications and embedded devices could be.
The first thing an IT security executive should do after the corporate network has been breached is fall back on the incident response plan that was put in place well before attackers got through the carefully constructed defenses.
A vulnerability in Android's default Web browser lets attackers spoof the URL shown in the address bar, allowing for more credible phishing attacks.
A critical vulnerability in code used by several virtualization platforms can put business information stored in data centers at risk of compromise.
The mystery high-severity flaw that people were expected to be fixed in OpenSSL is no Heartbleed, but it is serious and users should update.
- AOL acquires Millennial Media to bolster in-app and mobile smarts
- The 7 common mistakes marketing leaders are still making
- How Greenstone is uniting IT/marketing in the name of audience management
- Rakuten Marketing chalks up rapid Aussie digital advertising growth
- Paid endorsements get Xbox One marketer in trouble with FTC