Data from routines intended to calibrate motion sensors can identify individual iOS and Android devices in a newly released exploit. Attackers can use some of the mechanisms around sensors...
Read more12 dark secrets of encryption
May 23 2019Encryption is fast becoming developer’s go-to solution for whatever data privacy or security worry ails you. Afraid of putting your credit card into a web form? Don’t worry. We’re...
Read more12 dark secrets of encryption
May 23 2019Encryption is fast becoming developer’s go-to solution for whatever data privacy or security worry ails you. Afraid of putting your credit card into a web form? Don’t worry. We’re...
Read moreData Asset Management: What Do You Really Need?
May 23 2019At Interop, a cybersecurity and privacy leader explains her approach to data management and governance at a massive, decentralized company. INTEROP 2019 – LAS VEGAS – Nobody wants to...
Read moreData Asset Management: What Do You Really Need?
May 23 2019At Interop, a cybersecurity and privacy leader explains her approach to data management and governance at a massive, decentralized company. INTEROP 2019 – LAS VEGAS – Nobody wants to...
Read moreThe new exploit builds a fake frame around legitimate portions of an online commerce website. A new strain of software designed to steal financial information from retail websites has...
Read moreThe new exploit builds a fake frame around legitimate portions of an online commerce website. A new strain of software designed to steal financial information from retail websites has...
Read moreA new analysis highlights the prevalence of malware signed by certificate authorities and the problems with trust-based security. Researchers with Chronicle, the cybersecurity company and Alphabet subsidiary, today published...
Read moreA new analysis highlights the prevalence of malware signed by certificate authorities and the problems with trust-based security. Researchers with Chronicle, the cybersecurity company and Alphabet subsidiary, today published...
Read moreLegal Threats Make Powerful Phishing Lures
May 23 2019Some of the most convincing email phishing and malware attacks come disguised as nastygrams from a law firm. Such scams typically notify the recipient that he/she is being sued,...
Read more
Recent Comments