Mark Twain once said, "The report of my death was an exaggeration." Can the same be said for the password?
Application security firm Checkmarx announced on Thursday it received an $84M investment from Insight Venture Partners.
NowSecure detailed a vulnerability in Samsung's pre-installed Swift keyboard app that leaves device owners vulnerable to remote code execution.
Digital Identity is the foundation for granting user access in today's connected enterprise. Dated authentication approaches fall short on both security effectiveness and user experience.
During the afternoon keynote at SC Congress Toronto, Lodewijkx shared IBM's guiding principles for mitigating IT security threats.
Apple will require iOS 9 users to use six-digit passwords and two-factor authentication when signing into Apple services from a new device or browser.
Swapping out magnetic stripe payment cards for those equipped with computer chips is no small task, reports Karen Epper Hoffman.
An iOS 8 bug in the Messages app causes iPhones to crash and reboot after receiving a specific string of Arabic characters.
How serious is the risk of visual hacking in your organization? Consider who may be viewing, photographing and collecting sensitive information from your offices and electronic devices when staff is mobile.
More than 30 apps in the Google Play store were found to be scareware posing as Minecraft cheats.
U.S. authorities are investigating claims by British Uber customers that they were charged for phantom rides in the U.S.
F-Secure observed an uptick in ransomware as well as malware for both Android and iOS in the second half of last year, according to its new threat report.
Sixty-four percent of millennials used their employer-owned device for personal use, compared to 37 percent of baby boomers.
The Federal Communications Commission (FCC) said Verizon Wireless and Sprint would pay $90 million and $68 million respectively for billing customers for unauthorized third-party texting services charges.
Starbucks customers say auto-reload feature is being used to steal from their linked credit cards and bank accounts.
Kaspersky Lab saw 3.3 times as many new malicious mobile programs in Q1 2015 than it did in the final quarter of last year.
The threat actors set up malicious adult websites to distribute the malware, and so far infection rates are estimated to be in the thousands.
The world of IT security is undergoing tremendous change. The unstoppable momentum of the Internet and cloud computing, the ubiquity of mobile devices and the emergence of Internet of things have together turned the IT security landscape upside down.
A glitch in an iPad apps pilots use to communicate caused of 74 flight delays for American Airlines.
EMV, despite its security features over magnetic stripe cards, cannot prevent against "wholesale breaches of large numbers of credit card numbers," report authors said.
Andrew Hogg, CEO of Now Source, explains how some of the most popular applications can be riddled with security flaws.
According to the co-founders of Skycure, which presented on the attack at RSA Conference, Apple has not completely resolved the security issue.
Contactless payment systems such as EMV cards and Apple Pay are convenient, but are not without weaknesses.
Motherboard and Privacy International revealed the contract between DEA and a government supplier.
The threat landscape is evolving, and mobile threats are on the rise.
The AlienSpy remote access trojan (RAT) is being sold to attackers via subscription plans, ranging from around $20 to $220.
An Avast global survey measuring data preservation habits found that despite not backing up regularly users are concerned with the data in their devices.
The rate of Potentially Harmful Application installs on Android devices decreased nearly 50 percent from early 2014 to later that year, according to a Google report.
The rise of IoT will require a completely new approach to network security, says vArmour CEO Timothy Eades.
Given the recent headline-grabbing breaches, in this month's debate information security professionals discuss whether or not money is safe online.
Sign up to our newsletters
SC Magazine Articles
- 'MEDJACK' tactic allows cyber criminals to enter healthcare networks undetected
- Samsung devices, including Galaxy S6, vulnerable to remote code execution
- Study: Organizations taking months to remediate vulnerabilities
- Dridex banking malware spreading through new spam campaign
- U.S., China agree to cybersecurity code of conduct