The world of IT security is undergoing tremendous change. The unstoppable momentum of the Internet and cloud computing, the ubiquity of mobile devices and the emergence of Internet of things have together turned the IT security landscape upside down.
According to the co-founders of Skycure, which presented on the attack at RSA Conference, Apple has not completely resolved the security issue.
Contactless payment systems such as EMV cards and Apple Pay are convenient, but are not without weaknesses.
Motherboard and Privacy International revealed the contract between DEA and a government supplier.
The threat landscape is evolving, and mobile threats are on the rise.
The AlienSpy remote access trojan (RAT) is being sold to attackers via subscription plans, ranging from around $20 to $220.
An Avast global survey measuring data preservation habits found that despite not backing up regularly users are concerned with the data in their devices.
The rate of Potentially Harmful Application installs on Android devices decreased nearly 50 percent from early 2014 to later that year, according to a Google report.
The rise of IoT will require a completely new approach to network security, says vArmour CEO Timothy Eades.
Given the recent headline-grabbing breaches, in this month's debate information security professionals discuss whether or not money is safe online.
In a Ponemon report, 2,300 security pros provided their two-year outlook on cryptographic key and digital certificate attacks.
In the Lookout survey, only five percent of smartphone users said they would take the most steps to protect work-related data.
Although most IT professionals believe mobile apps in the workplace have increased security risks, less than half of organizations have a policy in place to define acceptable mobile app use.
A misstep by an IT employee of Canadian communications conglomerate Rogers Communications allowed the contractual information of 50-70 of the company's business customers to be exposed via Twitter.
Despite Google's new review process, mobile security company Lookout recently identified 13 apps with adware that made it into Google Play.
The SSL/TLS vulnerability FREAK can be exploited to force an HTTPS connection to use weaker and, therefore, easier to crack encryption.
David Bozin, vice president of growth development at Bindo discusses mobile POS considerations, with the help of newer technologies.
Three days after Yahoo announced its new "on-demand" passwords (ODP), the company's CISO Alex Stamos took to Twitter to defend the company's decision and address criticism from the security community.
Yahoo took advantage of South by Southwest's (SXSW) opening weekend this week to make major announcements surrounding its services' security, including the launch of its "on-demand" password service.
Cloud apps and mobile devices are screaming their way into the enterprise like jet fighters, bringing employees more access than ever - and more passwords as well.
Hillary Clinton's emails went unencrypted for the first three months she was secretary of state but have been encrypted since.
Software developers are challenged with prioritizing between delivering code within aggressive timelines and incorporating security into the development lifecycle.
The flaw could ultimately expose user data, saved to Dropbox through vulnerable third-party apps, to attackers.
Veracode researchers analyzed a pool of about 400,000 applications installed in multiple global enterprises in various industries.
Trustwave polled security professionals on the pressures they felt this past year to keep their enterprise secure.
Researchers associated with the CIA have, for years, conducted tests to break the security of Apple's mobile products, including iPhones and iPads, and have presented their findings at a secret annual meeting.
Bluebox Security thought it tested a legitimate Xiaomi Mi 4 device, riddled with security issues.
Credit card data from the Target and Home Depot breaches has been used by attackers to make purchases at Apple stores via the popular Apple Pay system.
The smartphone was verified to be a legitimate device by major smartphone distributor Xiaomi.
Hillary Clinton used a private email account during her tenure as secretary of state.
Sign up to our newsletters
SC Magazine Articles
- Study: Open Source Software use increasing in enterprises but without vulnerability monitoring
- RSA Conference 2015: Prepare for the IoT before it's too late, Sorebo warns
- 'Aaron's Law' returns to Congress
- RSA 2015: Tension continues to grow between govt, cryptographers
- Data at risk for 9,000 individuals following unauthorized access to SRI Inc. website
- Study: Conficker declared top threat of 2014, but N. America targeted mainly by AnglerEK
- RSA 2015: Straight talk about encryption, bulk surveillance and IoT
- RSA 2015: In the healthcare industry, security must innovate with business
- RSA 2015: Unintended use of aircraft systems next challenge for counterterrorism community
- RSA 2015: Bug hunting and responsible vulnerability disclosure