May 21, 2015 Adware Identified as Second-Biggest Security Threat of 2014 3 min read - Adware programs that are designed to render advertisements on end user systems emerged as the second-most prevalent security threat in 2014.
May 20, 2015 How a Fake Password Project Could Make Cybercriminals’ Lives Difficult 2 min read - Researchers have created a fake password project that would allow companies a way to potentially limit the damage of leaked login information.
May 20, 2015 Data Protection: Are Humans the Weakest Link? 2 min read - Are humans the weakest link in data protection? A recent report from law firm BakerHostetler suggests this is case. Can companies mitigate the issue?
May 18, 2015 Second Sally Beauty Data Breach in 15 Months Highlights POS Threats 3 min read - A data breach at Sally Beauty Holdings — the second in just over a year — highlights POS security risks currently facing businesses of all sizes.
May 18, 2015 United Airlines Launches Bug Disclosure Program to Bolster Software Security 2 min read - United Airlines has become the first company in the airline industry — and one of the few non-software vendors — to launch a bug disclosure program.
May 14, 2015 VENOM Flaw: The Truth About the Danger to Data Centers and Cloud Customers 2 min read - Researchers recently exposed the VENOM flaw, which could let hackers sabotage virtual machines in cloud computing environments around the world.
May 14, 2015 Knock, Knock: New Ransomware Breaks In for Bitcoins 2 min read - Two new ransomware threats have surfaced in the last week, one identified by Symantec and the other by Rackspace. How can companies protect their data?
May 13, 2015 Tinba Malware Watches Mouse Movements, Screen Activity to Avoid Sandbox Detection 2 min read - Security researchers found that the Tinba malware is no longer relying on its small size as the only way to avoid detection from sandbox technology.
May 12, 2015 New Payment Technologies Prompt Data Security Concerns 3 min read - Pressure to migrate to new technologies is creating fresh data security risks for consumers, say stakeholders in the payment systems industry.
May 12, 2015 Malicious Macros in Spam Documents More Sophisticated Than Ever Before 2 min read - A researcher recently found formats that save Web pages are being used to create malicious macros in spam to distribute malware to unsuspecting users.