Please turn on your JavaScript for this page to function normally.
Insider threat: A crack in the organization wall

Vormetric announced the European findings of a survey conducted by Harris Poll in fall 2014 among 818 enterprise IT decision makers (ITDMs) in various countries, including 204 …

IoT developers concerned about privacy and data protection

An impressive 65 percent of Internet of Things (IoT) apps in production today are generating real revenue. The study results, undertaken by Progress and Harbor Research, also …

Unpatched OS X, iOS flaws allow password, token theft from keychain, apps

Six researchers from Indiana University Bloomington, Peking University and Georgia Tech have recently published a paper in which they detail the existence of critical security …

Let’s Encrypt CA to issue its first cert

Let’s Encrypt, a non-profit certificate authority (CA) set up by the Electronic Frontier Foundation, Mozilla, Cisco, Akamai, IdenTrust, and researchers at the University …

Zero Trust approach to network security

Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.With Zero Trust there …

86.2 million phone scam calls delivered each month in the U.S.

Phone fraud continues to threaten enterprises across industries and borders, with the leading financial institutions’ call centers exposed to more than $9 million to potential …

Keyboard app bug puts millions of Samsung mobile users at risk, researcher claims

A vulnerability in the Swift keyboard, which comes pre-installed on Samsung mobile devices, can be exploited by remote attackers to secretly install malicious apps, access the …

Exposing cyberattacks targeting government networks in Southeast Asia

Palo Alto Networks uncovered a series of potentially state-sponsored cyberattacks targeting government and military organizations in countries throughout Southeast Asia. Help …

Risks from fraudulent mobile apps and unauthorized app stores

Companies spanning retailers, travel companies, media & entertainment, gambling firms and banks have far more mobile apps owned by them or referencing their brand than …

Newly patched Flash Player bug exploited to deliver crypto ransomware

“It took less than a week for a functional exploit for a recently patched Adobe Flash Player vulnerability to be added to the Magnitude exploit kit, Trend Micro …

Reactions to the LastPass breach

LastPass, the company behind the popular password management service of the same name, has announced that they have suffered a breach, and has urged users to verify their …

Google announces reward program for Android bugs

Google has announced that it will start paying researchers for information about vulnerabilities affecting Android.The Android Security Rewards are incremental. “For …

Don't miss

Cybersecurity news