Covert data exfiltration techniques can be perfected with the help of 10 commandments, which were recently laid out by researchers.
Data exfiltration techniques are getting more sophisticated. How do companies protect their interests against attackers who are willing to get creative?
The IBM Security X-Force Research team has uncovered a serious vulnerability that affects many Android applications built on the Apache Cordova platform.
Maintaining the security of POS systems is a growing concern: The Dexter malware has been found to target customers' payment information.