Apple Updates OS X, iOS With Numerous Security Fixes
Apple releases security updates for both its Mac OS X and iOS operating systems. Once again, Google is a leading contributor to improving Apple security. Apple today released security updates for its...
View ArticleTender Armor Adding New Layer of Security to Credit Card Transactions
The startup's CvvPlus fraud prevention technology provides another layer of authentication via a randomly generated CVV number sent to the credit card holder. Privately held security startup Tender...
View ArticleIBM Launches Security App Exchange Marketplace
IBM's new Security App Exchange gives organizations access to collaboratively built security solutions. IBM has made a couple of moves to open up its security platform, including launching the IBM...
View ArticleFrench Police Looking to Ban Tor Network and Free WiFi
A crackdown on insecure and unsecured networks follows Paris terrorist attacks last month. By Michael Moore The French government is set to consider a series of recommendations for monitoring online...
View ArticleUnited Kingdom Is Leading Source of DDoS Attacks
An Akamai report identifies the United Kingdom as the leading originator of DDoS attacks. By Tom Jowitt The United Kingdom has been identified as the leading originator of DDoS attacks, in Akamai's...
View ArticleWick Hill Now Shipping WatchGuard T30 And T50 Firebox Appliances
WatchGuard Brings Security and Convenience to the Distributed EnterpriseFirebox T30 and T50 appliances deliver high-performance, enterprise-grade security from an easy to configure, deploy, and manage...
View ArticleContent Theft Websites Delivering More Than Just Content
New research shows a thriving $70 million a year market for malware delivery on content theft Websites. In the dark reaches of the Internet are hundreds, if not thousands, of sites that offer users the...
View ArticleDispel’s Privacy as a Service Technology Emerges From Stealth
Using multiple cloud providers, the service provides private connections and systems to enable user privacy. Privately held startup Dispel (dispel.io) officially launched its privacy-as-a-service...
View ArticleData Breaches Put Spotlight on Growing Threats to Kids’ Data Privacy
With a major breach at toy maker VTech and privacy advocates criticizing Mattel and Google, 2015 put a spotlight on the growing threats to children's privacy. It has not been a good year for children's...
View ArticleTeslaCrypt criminals launch ‘very strong’ spam campaign to spread crypto-malware
Trojan's authors change tactics in apparent attempt to infect businesses with crypto-malware
View Article77,000 Steam Gaming Accounts Are Hijacked Each Month
Valve's popular gaming platform is finally set to come to terms with rampant fraud and insecurity on its platform. Gaming vendor Valve is admitting that it has a problem with account theft in its Steam...
View ArticleCyber-Scammers Step Up Volume of Robocall Schemes During Holidays
NEWS ANALYSIS: The advent of the holiday season seems to increase the number of phone scammers trying to install malware on your computer. Today's call came the same way it has almost daily for the...
View ArticleRetailers Lack Proper Security Control and Visibility, Report Finds
Bay Dynamics sheds light on some critical gaps between the perceptions and realities of retail security. According to a new report sponsored by Bay Dynamics, there are some critical areas of security...
View ArticleWinMagic to power NCR Secure™ Hard Disk Encryption solution
London, UK – 14 December 2015 – WinMagic Inc., the leading provider of encryption and intelligent key management solutions, today announced a strategic partnership with NCR, the global leader in...
View ArticleGoogle Pulls Trust for Symantec Root Certificate
For security reasons, Chrome, the Android OS and other Google products will no longer trust digital certificates from an old Symantec root certificate. Google's Chrome browser, Android OS and other...
View ArticleCisco Opens Up Vulnerability Disclosure With OpenVuln API
Cisco's Product Security Incident Response Team pushes a new approach that makes security advisories easier to consume and act upon. IT professionals are inundated on a daily basis with security...
View ArticleAnalyst Survey Reveals Pros And Cons Of Cloud Commodity Trade And Risk...
Over the past 15 years a lot has changed in terms of technology, including the understanding and acceptance of the cloud, as evidenced by a recent Commodity Technology Advisory (ComTech Advisory)...
View ArticleMimecast talks social engineering, and how your organisation can be...
And email is still the path of least resistance
View ArticleHow Connected Analysis Can Put a Dent in Cyber-crime
Sample Scenario: E-Commerce Fraud Online transactions typically take place with identifiers. These include facets such as user ID, IP address, geolocation, a tracking cookie and a...
View ArticleUK Police Make Arrest in Connection With VTech Hacking
British law enforcement officials arrest a 21-year-old man in connection with attack on toy maker VTech that exposed 6 million parents and children to risk. Barely three weeks after the first public...
View Article