June 8, 2015 Mea Culpa? Locker Ransomware Author Apologizes, Decrypts Files for Free 2 min read - Locker Ransomware author apologizes and decrypts files for free, but is there more to this story than just a compassionate criminal showing remorse?
June 2, 2015 Facebook Notification Encryption Uses OpenPGP to Protect Users 2 min read - The world's biggest social network says Facebook notification encryption will help more users feel safe using its popular services to communicate.
June 1, 2015 Website Vulnerabilities Are Everywhere, and They’re Taking Too Long to Get Fixed 2 min read - The results of a recent study showed there are website vulnerabilities in 86 percent of online properties, and many go neglected for far too long.
May 29, 2015 Eighty Percent of Employees Confess to Taking Major Cybersecurity Risks 2 min read - A recent research study showed that employees continue to take major cybersecurity risks despite being aware of the danger they pose to their companies.
May 29, 2015 IRS Data Theft Taxes Patience of 100,000 Users 2 min read - News of an IRS data theft reveals that 100,000 tax returns were stolen using "Get Transcript," prompting $50 million in fraudulent refunds.
May 27, 2015 New Android Ransomware Goes After XXXtra Cash 2 min read - New Android ransomware is locking down mobile phones with fake FBI warnings for looking at adult content and demanding MoneyPak codes for release.
May 27, 2015 Effectiveness of Security Questions Called Out in New Study 3 min read - The effectiveness of security questions has been called out in a new Google study. Are user answers really as unique as they ought to be?
May 27, 2015 IC3 Internet Crime Report Shows Social Media Complaints Have Quadrupled in Five Years 2 min read - Social media-related scams including clickjacking, doxing and pharming are noticeably on the rise, based on the recent IC3 Internet Crime Report.
May 21, 2015 Logjam Flaw May Open Data to Cybercriminals by Fooling Web Browsers 2 min read - Researchers say the Logjam flaw could fool Web browsers and servers into using weak encryption keys, allowing cybercriminals to intercept and decode data.
May 21, 2015 Security Analytics Gets Top Marks but Low Numbers — What Gives? 2 min read - Security analytics gets top marks from IT pros but scores low in penetration. What's preventing this new technology from gaining ground?