Please turn on your JavaScript for this page to function normally.
online shopping
Credit card fraud down 29% for the first time

Iovation released data collected from its retail and e-commerce subscribers from the 2017 holiday weekend (Nov. 24 – 27, 2017). For the first time in recent years, …

cybersecurity
Surge in exposed credentials puts companies at risk

The volume of credential exposures has increased to 16,583 from April to July 2017, compared to 5,275 last year’s analysis by Anomali. 77% of the FTSE 100 were exposed, with …

fingerprint
Poor security habits are the ideal recipe for a breach

A Preempt survey of more than 200 employees (management level or above) from enterprise companies of 1000 or more people, found that businesses are left exposed by employees …

mobile code
Eavesdropper vulnerability exposes sensitive corporate communications data

Appthority published research on its discovery of the Eavesdropper vulnerability, caused by developers carelessly hard coding their credentials in mobile applications that use …

Paper and phone
1 in 5 IT security pros still use paper to track accounts and passwords

Dimensional Research recently surveyed 913 IT security professionals on challenges, habits and trends related to managing access to corporate data. Among the most eye-opening …

BYOD
The evolution of BYOD security in a mobile-first world

Bitglass’ research team surveyed 200 IT and security professionals at a national Gartner conference to learn more about the evolution of BYOD security in a mobile-first world. …

Amazon Key
Would you let Amazon unlock your door?

Amazon recently announced the launch of the Amazon Key, allowing the Amazon delivery person to open your door in order to place your package inside, where presumably it will …

Pixie
Camera-based, single-step two-factor authentication resilient to pictionary, shoulder surfing attacks

A group of researchers from Florida International University and Bloomberg LP have created Pixie, a camera-based two-factor authentication system that could end up being a …

Terminal
Most organizations don’t have SSH security policies in place

Cybercriminals can abuse SSH keys to secure and automate administrator-to-machine and machine-to-machine access to critical business functions. According to Venafi’s research, …

password
Leaving employees to manage their own password security is a mistake

Despite the clear and present danger that weak passwords pose to organizations, many remain focused on implementing technology based on policy, not the user, to address the …

users
Inadequate IT processes continue to create major security and compliance risks

The results of a study of more than 900 IT security professionals, conducted by Dimensional Research, spotlights how common security best practices – such as timely …

Apple Face ID
How Apple’s Face ID works, learns, and protects

Apple has unveiled a new version of its privacy page and a paper throwing more light on how Face ID, its newest biometric authentication option, works on iPhone X …

Don't miss

Cybersecurity news