devxlogo

Security Zone

Tips for Ensuring Secure Web Login

User authentication is employed by a large number of websites. However, the security of that authentication is often not properly implemented, making the websites an easier target for malicious hackers.

Security Startups Become Hot Acquisiton Targets

Security startups have become hot acquisition targets for bigger companies that are trying to protect themselves or their customers from an endless stream of cyberattacks, according to Bob Ackerman, the

Who Wrote the Nefarious Stuxnet Worm? And Why?

Imagine a nefarious computer virus, one some industry experts say may bethe most sophisticated piece of malware ever written. Imagine this worm,loaded onto a Siemens Programmable Logic Controller (PLC),creating two

Ignore Data Security at Your Peril

When HM Revenue & Customs revealed in November 2007 that it had lost 25 million records, the profile of data breaches exploded. Since that day, we have seen countless organizations,