Convenience still overrides security for mobile shoppers
Despite a huge increase in shopping on mobile handsets, shoppers do not have security in place to protect the identity and credit card data stored on the devices, according to …
IBM prevents services from running compromised code
IBM inventors have patented a technique that can enable businesses to improve cloud security and support secure transactions by preventing mobile devices from accessing …
How human behavior affects malware and defense measures
Installing computer security software, updating applications regularly and making sure not to open emails from unknown senders are just a few examples of ways to reduce the …
CIOs will continue to focus on business intelligence and analytics
The CIO focus on business intelligence (BI) and analytics looks set to continue through 2017, according to Gartner. Gartner said that the benefits of fact-based …
Building an OATH-compliant authentication server for less than $100
Using a Raspberry Pi nanocomputer and the multiOTP open source library, André Liechti showcases how to how to create an OATH-compliant authentication server at PasswordsCon …
Resurgence of malware signed with stolen certificates
Since 2009, variants of the Winwebsec rogue AV family have been trying to trick users into believing their computer has been infected and into paying for …
NSA can easily decrypt private cell calls
A document from the seemingly inexhaustible trove delivered by former NSA contractor Edward Snowden shows that the NSA can easily break the old and weak algorithm still used …
Shady Android AV pushed onto unsuspecting users
A deceptive advertising campaign pushing a shady antivirus solution is actively targeting Android users, warns Malwarebytes’ Armando Orozco. The pop-ups are triggered …
WhatsApp-themed spam campaign delivers malware
A new WhatsApp-themed spam campaign has been spotted targeting users of the popular IM service. The spam email claims to be a notification about a voice message someone left …
Gamers attacked 11.7 million times in 2013
Just days after the launch of the PlayStation 4 and the Xbox One, Kaspersky Lab experts have discovered that PC gamers across Europe were hit by a massive number of attacks in …
How competitive is your cybersecurity team?
SecureWorld Insight, a partnership with Ponemon Institute and SecureWorld Expo, identified compensation for eight categories of information security staff – from CISOs …
IT pros are playing cat and mouse with cybercriminals
IT professionals admit to feeling lost when it comes to trying to protect the company against cyber attacks and cybercriminals. This could be a big problem for all of us, as …
Featured news
Resources
Don't miss
- Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
- Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military
- A new way to think about zero trust for workloads
- Heisenberg: Open-source software supply chain health check tool
- Securing real-time payments without slowing them down