News

Every security practitioner knows that employees are the weakest link in an organization, but this is no longer the case.
Joining Graham Peck will be Isaac Moddel, VP Sales at Reflectiz, an expert in client-side security. Moddel will offer ...
The OpenSSL Corporation and the OpenSSL Foundation are issuing a final call for speaker proposals for the inaugural OpenSSL ...
In this Spotlight episode of the Podcast, sponsored* by ForAllSecure we speak with CEO David Brumley about application “fuzzing” and how advancements in machine learning technology are allowing ...
In-brief: Alphabet’s Nest Cam continues to run even after users have turned it “off,” the company acknowledged on Tuesday, raising questions about transparency and the potential for privacy abuses ...
Efforts by the federal government and campaigns to keep state sponsored hackers from Russia and China out of U.S. elections may have overlooked a one major source of vulnerability: the hardware and ...
Tomislav Peričin in to the Security Ledger studios to talk. Tomislav is the Chief Software Architect at the firm ReversingLabs and he’s an expert in software analysis and supply chain risks. In this ...
Modern container ships already face a number of serious perils at sea. Now new research from Pen Test Partners shows just how vulnerable these ships are to new dangers from hacking–including being ...
Imagine this: you go to your local supermarket to pick up some food for a barbecue. Perusing the meat aisle, you grab a package of shrink wrapped, raw sausages. As you put them into your shopping cart ...
The agricultural equipment industry has long considered itself immune from cyber attacks. After all: farm equipment wasn’t Internet-connected and the software and protocols that it used were obscure.
The researchers, John Jackson, an application security engineer for Shutter Stock, and the independent researcher known by the handle “ Sick Codes,” said the flaws amount to a “back door” on any TCL ...