June 26, 2015 Researchers Develop Hacking Gear Small Enough to Fit Inside a Pita Sandwich 2 min read - You can pack a lot into the average pita — including enough high-tech equipment to eavesdrop and steal data from nearby laptops, researchers have shown.
June 25, 2015 Adobe Flash Zero-Day Vulnerability Prompts Emergency Patch 2 min read - Adobe recently issued a patch to address a vulnerability in its popular Flash Player. If not fixed, users could be the target of cybercriminals.
June 25, 2015 Cash Grab: Attacks on Financial Industries Outpace All Others 4 to 1 2 min read - A new Websense Security Labs report found that attacks on banks and other finanical industries outpace all others 4 to 1. How do banks respond?
June 23, 2015 Samsung Promises Swiftkey Fix, but Gives No Timeline 2 min read - Samsung's default mobile keyboard, Swiftkey, contains a serious vulnerability. But with a fix coming later rather than sooner, how can users stay safe?
June 22, 2015 Microsoft to Make HTTPS a Default Setting for Bing 2 min read - Microsoft announced it will join other search engines when it begins using HTTPS for encrypting Web traffic as the default setting for all Bing users.
June 17, 2015 Log Management Is a Key Use Case for Big Data Solutions, Survey Shows 2 min read - Log management for security-related purposes has become one of the biggest use cases for big data solutions, a survey by the SANS Institute shows.
June 17, 2015 Microsoft Clarifies Its Stance on Whether the Ask Toolbar Is Malware 2 min read - A recent security policy change from Microsoft was interpreted as a way of classifying programs such as the Ask toolbar as malware.
June 17, 2015 Why Wikimedia Is Doubling Down on Data Encryption With HTTPS 2 min read - Wikimedia Foundation says it will use HTTPS data encryption across all its sites, including Wikipedia, to combat attackers and censors around the world.
June 17, 2015 Kickstarter Crowdfunding Case Sends a Simple Message: Caveat Emptor 2 min read - A new FTC ruling on its first-ever crowdfunding case sends a simple message: Creators are responsible for money management, but buyers must beware.
June 15, 2015 Cybersecurity Risk: Right Resources, Wrong Place Put Companies Under Threat 2 min read - Seventy-five percent of companies say they aren't mature enough to handle cybersecurity risk. The biggest problem? Poor resource allocation.