Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.

Featured Stories

Articles about Security

Hacking brain-computer interfaces

Hacking brain-computer interfaces

Brain-computer interfaces (BCI) are still in their infancy, yet they've already been hacked. As well as the machine learning models they're built on, For once, can we build in security from the ground up, rather than trying to duct tape it on later? What, and overthrow decades of poor security practice? Not likely

12 hours ago by

10 Linux distros: From different to dangerous

10 Linux distros: From different to dangerous

One of the great benefits of Linux is the ability to roll your own. Throughout the years, individuals, organizations, and even nation states have done just that. In this gallery, we're going to showcase some of those distros. Be careful, though. You may not want to load these, or if you do, put them in isolated VMs. We're not kidding when we say they could be dangerous.

August 19, 2019 by

2019's tech, security, and authentication trends

2019's tech, security, and authentication trends

We take a look at the top tech, cybersecurity, and authentication trends as revealed today by the Duo Security's 2019 Trusted Access Report, which includes data from 24 million devices, one million apps and services, and billions of authentications.

July 16, 2019 by

Threat Intelligence Index Report from IBM X-Force

Christopher Scott, Global remediation lead, IBM X-Force incident response and intelligence services, sits down with Tonya Hall to talk about the latest Threat Intelligence Index Report and its findings, including that unpatched systems are a leading vulnerability while the finance and retail industries are two of the top industry cyber targets.

February 11, 2020 by

Top Stories