May 27, 2015 IC3 Internet Crime Report Shows Social Media Complaints Have Quadrupled in Five Years 2 min read - Social media-related scams including clickjacking, doxing and pharming are noticeably on the rise, based on the recent IC3 Internet Crime Report.
May 21, 2015 Logjam Flaw May Open Data to Cybercriminals by Fooling Web Browsers 2 min read - Researchers say the Logjam flaw could fool Web browsers and servers into using weak encryption keys, allowing cybercriminals to intercept and decode data.
May 21, 2015 Security Analytics Gets Top Marks but Low Numbers — What Gives? 2 min read - Security analytics gets top marks from IT pros but scores low in penetration. What's preventing this new technology from gaining ground?
May 21, 2015 Adware Identified as Second-Biggest Security Threat of 2014 3 min read - Adware programs that are designed to render advertisements on end user systems emerged as the second-most prevalent security threat in 2014.
May 20, 2015 How a Fake Password Project Could Make Cybercriminals’ Lives Difficult 2 min read - Researchers have created a fake password project that would allow companies a way to potentially limit the damage of leaked login information.
May 20, 2015 Data Protection: Are Humans the Weakest Link? 2 min read - Are humans the weakest link in data protection? A recent report from law firm BakerHostetler suggests this is case. Can companies mitigate the issue?
May 18, 2015 Second Sally Beauty Data Breach in 15 Months Highlights POS Threats 3 min read - A data breach at Sally Beauty Holdings — the second in just over a year — highlights POS security risks currently facing businesses of all sizes.
May 18, 2015 United Airlines Launches Bug Disclosure Program to Bolster Software Security 2 min read - United Airlines has become the first company in the airline industry — and one of the few non-software vendors — to launch a bug disclosure program.
May 14, 2015 VENOM Flaw: The Truth About the Danger to Data Centers and Cloud Customers 2 min read - Researchers recently exposed the VENOM flaw, which could let hackers sabotage virtual machines in cloud computing environments around the world.
May 14, 2015 Knock, Knock: New Ransomware Breaks In for Bitcoins 2 min read - Two new ransomware threats have surfaced in the last week, one identified by Symantec and the other by Rackspace. How can companies protect their data?