March 6, 2017 Android Users Must Stay Alert to New Security Flaw 2 min read - A new security flaw and fresh concerns about malware provide further evidence of the need for Android users to remain diligent to external risks.
March 3, 2017 New on the IBM Security App Exchange: QRadar Assistant 2 min read - The new QRadar Assistant is a security app from the IBM App Exchange that lets you manage your extensions through a simple dashboard widget.
March 2, 2017 New York State Codifies Financial Cybersecurity Regulations 2 min read - Financial services institutions doing business in New York state have new cybersecurity regulations to observe as of March 1, 2017.
March 2, 2017 Online Fraud and EMV: Conservation of Criminality? 2 min read - The adoption of EMV, or chip-and-PIN cards, is increasing, but so is online fraud. How do companies adapt to this conservation of criminality?
February 28, 2017 Cloudflare Bug Creates Customer Data Leak Concerns 2 min read - Customer data could be at risk after a bug at content delivery specialist Cloudflare spilled private information from its clients online.
February 28, 2017 Researchers Detect New Attacks Against MySQL Database 2 min read - Analysts found that MySQL databases had been attacked by a ransomware campaign similar to the one that affected MongoDB databases in January.
February 28, 2017 End-to-End Email Encryption: Google Pushes Latest Project to Open Source 2 min read - Google just pushed its email encryption project, E2EMail, to open source. What does this mean for the development of corporate email security?
February 27, 2017 Linux Update Fixes 11-Year-Old Flaw 2 min read - A recent Linux update patched a vulnerability that enabled fraudsters to use heap spraying methods to execute arbitrary code and escalate permissions.
February 27, 2017 Collision Attack Sounds the Death Knell for SHA-1 Cryptographic Function 2 min read - Google's announcement of the first-ever collision attack means the Secure Hash Algorithm 1 (SHA-1) is officially no longer secure.
February 27, 2017 Hurry Hard? Not For Hackers: Security Controls Fall in Less Than 12 Hours 2 min read - A recent survey revealed that hackers can bypass security controls in under 12 hours. How can companies protect critical systems and eliminate new threats?