IT security spend is on the rise; however, damaging attacks and data breaches are more common than ever. Part of the reason for this is the imbalance of spend and mindshare – many organizations allocate higher budget to...

With all the SSL/TLS bugs that seem to come out every month nowadays, as a security penetration tester it's hard for me to remember which bug causes what, how hard the exploit is, and what needs to be done to fix it. Over...

In March of this year, OWASP released their 2016 edition of the Mobile Top Ten. Now that organizations have had some time to get acclimated to it, I wanted to provide some of my thoughts on it.

OWASP got this one right. I...

V2V Communications: What About My Privacy?

by Gene Carter on November 23, 2016 at 5:02 PM

There is a shift in focus from surviving accidents to stopping an accident from ever happening. Have you ever experienced unexpected stopped traffic as you crest a hill? Or narrowly missed hitting another car because your...

In 2015, Statistica reported that holiday season desktop retail e-commerce spending in the United States amounted to 56.43 billion U.S. dollars with the most money being spent online on Cyber Monday. That year, Cyber...

Whether you're a seasoned security professional or complete novice, it's important to protect your personal information online. But how paranoid should you really be? Well, it depends on your personal threat model. Often...

The cloud offers the promise of improved scalability, availability, and IT infrastructure security. According to the 2016 Gartner Application Security Hype report, Cloud Service Providers (CSPs) are beginning to offer...

Have you ever asked a question and started it by saying "This may sound stupid, but…"? And how many times has someone responded to you, making you regret you ever asked that question? We've all been there at some point....

2016 OWASP Mobile Top 10 Vulnerabilities

by Dinesh Shetty on November 4, 2016 at 9:21 AM

Do you think mobile vulnerabilities are so different from web vulnerabilities that it warrants is own list?

While vulnerabilities are often similar across the various computing platforms, each has unique idiosyncrasies,...

Internet of Things devices have become more and more popular within the past few years, changing our lives and making things more efficient. However, just like computers, smart embedded devices can also be exploited. In...