July 24, 2015 Can Tokenization Overcome the Biggest Concerns About Biometric Authentication? 2 min read - HYPR released a biometric authentication SDK that would let third parties overlay fingerprint and voice recognition over other security processes.
July 24, 2015 Bot Blacklist: Tech Heavyweights Look to Block the Bad Guys 2 min read - The Trustworthy Accountability Group (TAG) is creating a bot blacklist in collaboration with Google, Facebook and Yahoo. Can they win the war on ad fraud?
July 23, 2015 About 30,000 Instances of MongoDB Exposed on Web, Security Researcher Says 2 min read - Some 30,000 instances of MongoDB are accessible over the Internet because of a failure by database administrators to properly configure them.
July 22, 2015 GamaPOS Malware Extends Reach With Andromeda Botnet 2 min read - Point-of-sale malware GamaPOS is looking for greater reach by leveraging the popular Andromeda botnet. But what's the risk factor?
July 22, 2015 NOMORE Attack Method Shows RC4 May No Longer Be a Reliable Way to Encrypt Data 2 min read - Researchers say it may be time to look beyond the RC4 algorithm to secure Web connections after they discovered an attack method called NOMORE.
July 21, 2015 Microsoft Can’t Protect You Any Longer: Keep Watch for Windows XP Malware 2 min read - After a long transition period, Microsoft has ended anti-malware protection for Windows XP, meaning users should move quickly to protect machines using it.
July 20, 2015 Breaking Up, Breaking In? Sensitive Data and the Ex-Employee 3 min read - Ex-employees aren't always cut off from corporate networks. How do companies ensure sensitive data is protected when users leave the fold?
July 17, 2015 Research Proves HTML5 Could Be Used to Hide Malware for Drive-By Download Attacks 2 min read - Researchers have shown how HTML5 could be used to hide malware through a series of obfuscation techniques that antivirus tools can't detect.
July 17, 2015 TeslaCrypt Levels Up Encryption With Version 2.0.0 2 min read - TeslaCrypt is back, this time with better encryption and a re-skin to make it look like part of CryptoWall. What's worth knowing about Version 2.0.0?
July 17, 2015 Malvertising Using SSL Is More Proof of How Quickly the Threat Is Growing 2 min read - A recent report suggested malvertising is reaching new heights, while a case involving the use of SSL redirects suggests hackers are getting smarter.