Shodan is a search engine for internet-connected devices — from web cams to water treatment facilities, yachts, and medical devices.
Hacker summer camp is almost upon us again. Here are some of the best talks of all time. Will this year's virtual talks measure up to these legends?
Abandoned domain names are low-hanging fruit for attackers, who can use them to access sensitive email or customer data.
Organizations moving to the TLS 1.3 protocol must decide whether to deploy middleboxes that intercept network traffic for greater visibility, but doing so presents security and regulatory risks.
Is your organization guilty of any of these security measures that don't really do much to protect data or systems?
A must-have tool for penetration testers and to check password strength
A few hours of due diligence when evaluating software for purchase is cheaper than incident response clean up.
Forging email has been with us since the beginning of the internet, but new security kludges are making it a lot harder.