Advanced Threats April 9, 2015 Top Security Myths That Could Leave Your Organization Vulnerable to an Attack 5 min read - These four pervasive security myths may keep organizations from moving to the higher level of security maturity that is needed to fight today's attackers.
Software Vulnerabilities April 8, 2015 The 10 Most Common Application Attacks in Action 4 min read - Based on OWASP's list of the 10 most common application attacks, IBM has created a video series highlighting each one and how organizations can stay safe.
Application Security April 3, 2015 Mobile Payment Technology: Secure or Subpar? 3 min read - With the growing popularity of Apple Pay, Google Wallet and Venmo, users are wondering whether mobile payment technology is secure and safe to use.
Application Security March 31, 2015 Mobility and IoT Security: Why Manufacturers Need to Change Their Mindset 3 min read - With the rise of wearables, the expansion of the smart-home ecosystem and the advent of driverless cars, IoT security should no longer be an afterthought.
Application Security March 26, 2015 Ensuring Mobile Transaction Security Through Identification, Authenticity and Trustworthiness 4 min read - Identification, authenticity and trustworthiness can ensure mobile transaction security for financial industry-delivered applications.
Endpoint March 23, 2015 Management and Security Implications of the Smartwatch at Work 3 min read - The smartwatch has the opportunity to marry consumer interest and business function and ultimately launch wearable devices into the mainstream.
Application Security March 19, 2015 IBM-Sponsored Ponemon Institute Study Reveals Alarming State of Mobile Security for Apps 3 min read - According to an IBM-sponsored Ponemon Institute study on mobile security, apps are being created quickly to meet user demand but are not always secure.
March 18, 2015 Yahoo Mail Announces New Security Measures 2 min read - At the SXSW conference, Yahoo announced it will implement on-demand passwords and data encryption for its Yahoo Mail in order to improve security.
Software Vulnerabilities March 11, 2015 DroppedIn: Remotely Exploitable Vulnerability in the Dropbox SDK for Android 8 min read - IBM X-Force has discovered a vulnerability in Dropbox SDK for Android that lets attackers connect mobile apps to Dropbox accounts that they control.
March 10, 2015 Malware Calling: WhatsApp Feature Leveraged by Scammers 2 min read - A limited-time WhatsApp calling feature offer is actually a cybercriminal scam that works to trick unsuspecting users into downloading malware.