August 7, 2015 Are Cloud File Sync Tools Out of Step With Security? 2 min read - File sync services are now at risk of man-in-the-cloud (MitC) attacks, putting critical information at risk. What's the threat level for corporate data?
August 7, 2015 New Mac Security Threats: The Perfect Storm? 2 min read - Mac security is under fire thanks to a pair of new and potentially damaging vulnerabilities: Thunderstrike 2 and file-system zero-day exploit.
August 7, 2015 Why Stagefright and the Endless Reboot Bug May Have Prompted Google’s New Android Updates Program 2 min read - Google is changing how it approaches Android updates in order to mitigate vulnerabilities that users of the operating system have been encountering.
August 6, 2015 Zero-Day Research: Time From Discovery to Exploit Shrinks to Four Days 2 min read - New research presented at the Black Hat security conference showed that cybercriminals are getting faster at exploiting zero-day vulnerabilities.
August 5, 2015 In a BIND: DNS Server Attacks Exploit New Software Flaw 2 min read - New DNS server attacks are exploiting a flaw in the open-source BIND9, and websites at risk for attack need to move quickly to patch the problem.
August 5, 2015 Why Banks Are Turning to Tokenization to Protect Cloud Data 2 min read - A research report showed tokenization is gaining traction with banks that have begun to store highly sensitive information in the cloud.
August 5, 2015 Windows 10 Update: The Security Risks and Safeguards Everyone Should Know 2 min read - The Windows 10 update marks a major turning point for Microsoft. But while there are new safeguards, experts say there are also new threats.
August 5, 2015 Remote Risk? New JavaScript Threats Look to Grab Control 2 min read - Two new JavaScript attacks look to leverage remote threats and wrest control from users, but there are simple ways to block these attacks.
July 30, 2015 New Google Drive Phishing Attacks Baited, Ready and Hiding in Plain Sight 3 min read - New phishing attacks are targeting Google users in hopes of stealing their credentials by hiding in plain sight. Here's how to spot the hook.
July 29, 2015 Mobile Malady: Health Care IT Professionals Face New Data Diagnosis 3 min read - Mobile devices pose a significant problem for health care IT professionals. The NIST has released a draft guide to help addresses common issues.