March 30, 2017 Wipeout? Subpar Secondhand Mobile Device Security Leaves PII Exposed 2 min read - Secondhand mobile device security is a struggle for many, according to new research. Data found that 40 percent of reused devices still contain old PII.
March 28, 2017 Symantec’s SSL Certificate May Get Cut Off by Chrome 2 min read - In response to alleged violations, Google announced that its Chrome web browser will not trust an SSL certificate from Symantec for more than 279 days.
March 28, 2017 Almost Half of UK Firms Lack a Formal Security Strategy 2 min read - Most executives recognize the growing threat posed by cyberattacks, but few are putting the security strategy in place to help keep information safe.
March 27, 2017 ICS Infections Are Fewer Than Previously Thought 2 min read - Recent research from the firm Dragos has shed some light on the actual number malware infections affecting industrial control systems (ICS).
March 27, 2017 The Next Destination for Your Security Operations Is the Cloud 2 min read - Security operations are moving to the cloud, and IT managers are finding ways to support the use of a broad range of business applications on demand.
March 24, 2017 It’s a Wild, Wild Word: New Macro Malware Now Infecting Both Windows and MacOS 2 min read - New brands of macro malware are doubling down on Windows and MacOS operating systems. Here's a look at the newest Word-based attack.
March 23, 2017 WiCyS 2017 Addresses Skills, Gender Gap in Cybersecurity Industry 2 min read - One of the greatest opportunities to see cybersecurity collaboration in action is at the upcoming Women in Cybersecurity (WiCyS) Conference.
March 22, 2017 Hacked Site Reports Are on the Rise, Google Says 2 min read - Hacked site numbers continue to increase, according to Google. Businesses must take steps to ensure their online properties are safe and secure.
March 22, 2017 Pucker Up: Lips Can Now Provide Biometric Authentication 2 min read - Researchers from Hong Kong Baptist University have developed a new method of biometric authentication where devices read lip patterns.
March 22, 2017 Burgenoning Bug Bounty Programs Up the Ante 2 min read - Bug bounty programs are now paying out more to white-hat hackers, but they're also tightening regulations on payments and structure.