March 14, 2015 You’ve Got Email Spoofing: Researchers Expose Flaw in Google Apps Domain Verification Process 2 min read - The discovery of a flaw in Google Apps allowing cybercriminals to conduct email spoofing through the admin console may have some early adopters concerned.
March 13, 2015 Security Breach at Point of Sale Vendor NEXTEP Highlights Third-Party Security Risks 3 min read - Point of sale vendor NEXTEP recently experienced a payment card data breach, highlighting the risks companies face when partnering with third parties.
March 13, 2015 CIA Plans Digital Directorate to Tackle Cybersecurity Threats 2 min read - The CIA is planning to create a digital directorate that will focus on innovation in order to keep pace with emerging cybersecurity threats.
March 12, 2015 Lesson Learned? Data Breach at University of Chicago Exposes Student Records 2 min read - Student records and faculty information were exposed as part of a data breach against the University of Chicago. It is unclear who is responsible.
March 10, 2015 Malware Calling: WhatsApp Feature Leveraged by Scammers 2 min read - A limited-time WhatsApp calling feature offer is actually a cybercriminal scam that works to trick unsuspecting users into downloading malware.
March 10, 2015 Study: Banking ID Theft Losses Decline Despite New Data Breaches 2 min read - According to a recent study, even though banking ID theft is on the rise, the number of banking customers victimized and the total cost are down.
March 9, 2015 Android Users Infected With Gazon Mobile Malware Via Phony Amazon Gift Card Scheme 2 min read - Android smartphones are being hit with text messages promising an Amazon gift card, but it's really a way for cybercriminals to install mobile malware.
March 5, 2015 Publicly Stored Security Key May Have Enabled Uber Data Breach 2 min read - A recent data breach at Uber may have been enabled by a security key stored on a public GitHub page, according to a lawsuit filed by Uber.
March 5, 2015 Cyber Resiliency: Are Mobile Apps the New Fallback? 3 min read - As organizations work to boost their cyber resiliency to recover from attacks, mobile apps may be the newest security measure that can protect them.
March 5, 2015 Lenovo Superfish Scandal Prompts Probe, Promise to Reduce Preinstalled Software 2 min read - Lenovo says it is changing what it puts on its machines to avoid another Superfish scandal, even as a state attorney general's office probes the firm.