Reports

A story about attempts to hack South Carolina's election systems warrants scrutiny. (Image courtesy of Library of Congress.)

Maybe ignore that South Carolina Election Hacking Story

In-brief: a story claiming more than 100,000 hack attempts on South Carolina’s election systems raises more questions than it answers about efforts to tamper with the U.S.’s voting systems. 

Heartbleed’s Heartburn: Why a 5 Year Old Vulnerability Continues to Bite

Heartbleed’s Heartburn: Why a 5 Year Old Vulnerability Continues to Bite

In-brief: more than three years after it was first discovered, the Heartbleed vulnerability in OpenSSL continues to plague organizations worldwide. Why has it been so hard to fix? In this Industry Perspective, Patrick Carey of the firm Black Duck talks about some of the complicating factors that make vulnerabilities like Heartbleed so hard to eradicate. 

Two flaws in a common home router by TP-Link leave the devices vulnerable to hacks by anyone in wireless range. (Image courtesy of TP Link.)

Exclusive: Flaws in common Wi-Fi Router set up Hotspot Hacks

In-brief: Two, serious flaws in a common wireless router made by the firm TP-Link open the door to a hacker gaining control over the device, just the latest flaw revealed in broadband and wifi routers, the firm Senrio said Monday.

Identity at Scale: how the Internet of Things will Revolutionize Online Identity

Identity at Scale: how the Internet of Things will Revolutionize Online Identity

In-brief: Far from ‘breaking’ the public key encryption (PKI) model, the Internet of Things is poised to turbocharge PKI adoption and revolutionize online identity, DigiCert* CTO Dan Timpson writes.

Flashpoint's Mid Year Report warns of the prospect of more cyber attacks by nations like Russia and North Korea, as offensive online actions become a preferred mode of geopolitical action. (Image courtesy of Library of Congress.)

A New Great Game: Russia, China, North Korea heighten Cyber Risk

In-brief: Russia, China and North Korea are increasingly willing to use offensive cyber operations to weaken their enemies, including the United States, according to a report by the firm Flashpoint, which released its Business Risk Index report on Tuesday.