Digital Identity is the foundation for granting user access in today's connected enterprise. Dated authentication approaches fall short on both security effectiveness and user experience.
How serious is the risk of visual hacking in your organization? Consider who may be viewing, photographing and collecting sensitive information from your offices and electronic devices when staff is mobile.
F-Secure observed an uptick in ransomware as well as malware for both Android and iOS in the second half of last year, according to its new threat report.
Sixty-four percent of millennials used their employer-owned device for personal use, compared to 37 percent of baby boomers.
The Federal Communications Commission (FCC) said Verizon Wireless and Sprint would pay $90 million and $68 million respectively for billing customers for unauthorized third-party texting services charges.
Starbucks customers say auto-reload feature is being used to steal from their linked credit cards and bank accounts.
Kaspersky Lab saw 3.3 times as many new malicious mobile programs in Q1 2015 than it did in the final quarter of last year.
The threat actors set up malicious adult websites to distribute the malware, and so far infection rates are estimated to be in the thousands.
The world of IT security is undergoing tremendous change. The unstoppable momentum of the Internet and cloud computing, the ubiquity of mobile devices and the emergence of Internet of things have together turned the IT security landscape upside down.
A glitch in an iPad apps pilots use to communicate caused of 74 flight delays for American Airlines.
EMV, despite its security features over magnetic stripe cards, cannot prevent against "wholesale breaches of large numbers of credit card numbers," report authors said.
Andrew Hogg, CEO of Now Source, explains how some of the most popular applications can be riddled with security flaws.
According to the co-founders of Skycure, which presented on the attack at RSA Conference, Apple has not completely resolved the security issue.
Contactless payment systems such as EMV cards and Apple Pay are convenient, but are not without weaknesses.
Motherboard and Privacy International revealed the contract between DEA and a government supplier.
The threat landscape is evolving, and mobile threats are on the rise.
The AlienSpy remote access trojan (RAT) is being sold to attackers via subscription plans, ranging from around $20 to $220.
An Avast global survey measuring data preservation habits found that despite not backing up regularly users are concerned with the data in their devices.
The rate of Potentially Harmful Application installs on Android devices decreased nearly 50 percent from early 2014 to later that year, according to a Google report.
The rise of IoT will require a completely new approach to network security, says vArmour CEO Timothy Eades.
Given the recent headline-grabbing breaches, in this month's debate information security professionals discuss whether or not money is safe online.
In a Ponemon report, 2,300 security pros provided their two-year outlook on cryptographic key and digital certificate attacks.
In the Lookout survey, only five percent of smartphone users said they would take the most steps to protect work-related data.
Although most IT professionals believe mobile apps in the workplace have increased security risks, less than half of organizations have a policy in place to define acceptable mobile app use.
A misstep by an IT employee of Canadian communications conglomerate Rogers Communications allowed the contractual information of 50-70 of the company's business customers to be exposed via Twitter.
Despite Google's new review process, mobile security company Lookout recently identified 13 apps with adware that made it into Google Play.
The SSL/TLS vulnerability FREAK can be exploited to force an HTTPS connection to use weaker and, therefore, easier to crack encryption.
David Bozin, vice president of growth development at Bindo discusses mobile POS considerations, with the help of newer technologies.
Three days after Yahoo announced its new "on-demand" passwords (ODP), the company's CISO Alex Stamos took to Twitter to defend the company's decision and address criticism from the security community.
Yahoo took advantage of South by Southwest's (SXSW) opening weekend this week to make major announcements surrounding its services' security, including the launch of its "on-demand" password service.
Sign up to our newsletters
SC Magazine Articles
- Long list of devices believed to be affected by NetUSB vulnerability
- Scammers target oil companies with sneaky attack
- CareFirst BlueCross BlueShield breached, more than one million individuals notified
- Study: Employees acknowledge risky security behavior, continue to engage in it
- Hack of airplane systems described in FBI docs raises security questions
- Hackers exploit Starbucks auto-reload feature to steal from customers
- Study: Nearly all SAP systems remain unpatched and vulnerable to attacks
- Former Nuclear Regulatory Commission employee arrested for alleged spear phishing campaign
- Millions of WordPress websites vulnerable to XSS bug
- FireEye first cybersecurity firm awarded DHS SAFETY Act certification
- Thousands of Bellevue Hospital Center patients notified of data breach
- Study: 86 percent of websites contain at least one 'serious' vulnerability
- Investigation ongoing in reported multimillion member Adult FriendFinder breach
- Report: $19M breach settlement between MasterCard, Target terminated
- FTC gives thumbs up to companies that cooperate during breach probes