Wolfgang Kandek

Privacy by Design: What it is and where to build it
People tend to think about privacy in terms of the individual, but it is also critically important for the proper functioning of any business organization. This is being made …

Cloud computing: Security and evolution
What we’ve seen in the past 15 years is cloud computing becoming increasingly popular. Many companies have focused plenty of resources in making cloud computing the most …

Oracle fixes 248 vulnerabilities in January patch update
Oracle has published their Critical Patch Update (CPU) for January 2016. The Oracle CPU is quarterly and addresses the flaws in large Oracle’s product line, including their …

Flaw allows malicious OpenSSH servers to steal users’ private SSH keys
Qualys researchers have discovered two vulnerabilities in the popular OpenSSH implementation of the secure shell protocol, one of which (CVE-2016-0777) could be exploited by …
Featured news
Resources
Don't miss
- How to get better results from bug bounty programs without wasting money
- Hackers launch data leak site to extort 39 victims, or Salesforce
- Cl0p exploits Oracle E-Business Suite zero-day in data theft, extortion campaign (CVE-2025-61882)
- How to succeed at cybersecurity job interviews
- Meet ARGUS, the robot built to catch hackers and physical intruders