2 min read - Intel and two other vendors have reportedly patched a firmware vulnerability that can affect some Unified Extensible Firmware Interface (UEFI) systems.
2 min read - A cybercriminal claims the iDict tool was only created to force Apple to deal with a vulnerability in iCloud that allowed brute-force attacks.
2 min read - Michael Mann's upcoming "Blackhat" the movie has a life-imitates-art quality based on recent hacking events, such as the devastating Sony Pictures attack.
2 min read - Researchers are using quantum mechanics to make credit cards more secure by using a photon of light to create unique, unbreakable patterns.
3 min read - Cloud applications have heightened the risks to corporate data posed by insiders with authorized access to enterprise systems, a recent survey shows.
2 min read - Security researchers said a recently discovered strain of ransomware called OphionLocker uses some of the most advanced cryptography yet developed.
3 min read - A look at the top data breaches that compromised millions of records containing personal information from major retailers and other companies in 2014.
2 min read - More than 100,000 WordPress-hosted websites appear to be infected with malware that redirects users to the SoakSoak.ru malicious website.
2 min read - Microsoft recently discovered a spam campaign spreading the notorious Trojan:Win32/Upatre downloader. Users are warned not to accept the wire transfer.
2 min read - Web attacks struck 38 percent of all computer users this year, an overall rise of 1 billion from 2013, as cybercriminals become more focused on banks.
Analysis and insights from hundreds of the brightest minds in the cybersecurity industry to help you prove compliance, grow business and stop threats.