May 7, 2015 Do No Harm? Medical Device Vulnerabilities Put Patients at Risk 2 min read - Hospitals now rely on medical device technology to improve care outcomes, but are security flaws in these devices putting patients at risk?
May 7, 2015 ‘S’ for Stick? New HTTPS Requirement Drops the Carrot 2 min read - Mozilla's upcoming HTTPS requirement will force developers to comply with its new security measures or get blocked from the browser.
May 5, 2015 Mumblehard Malware: Linux-Based Spam Generator Went Unnoticed for Five Years 2 min read - Researchers from ESET say the Mumblehard malware has infected thousands of machines, sending spam and staying undetected for more than five years.
May 4, 2015 CareerBuilder Phishing Emails: No Lure Needed? 2 min read - New CareerBuilder phishing emails are leveraging the trusted site to reel in unsuspecting businesses, and even savvy users may be fooled.
May 4, 2015 Nepal Earthquake Email Scams Could Lead Would-Be Donors to Malware 2 min read - Authorities say Nepal earthquake email scams could be directing users to phishing sites that contain malware under the guise of giving to charity.
May 4, 2015 Survey Shows Overconfidence in Ability to Detect Threats on Government Networks 2 min read - A new survey by MeriTalk reveals that many cyber pros may have an overly optimistic estimate about their ability to detect threats on government networks.
May 3, 2015 Mobile Threat Report: Dead Apps Walking? 2 min read - Dead apps now pose a serious threat to enterprise security, according to a new mobile threat report. What can companies do to avoid these mobile zombies?
April 28, 2015 Startup Says AC Power Could Be the Secret to Spotting Medical Device Malware 2 min read - A startup demoed technology at the recent RSA Conference that shows how AC power could detect medical device malware and fend off cybercriminals.
April 28, 2015 Bodyprint Biometrics: Are People the New Password? 2 min read - Yahoo has introduced a new type of biometric security, Bodyprint, which allows users to unlock their mobile devices with multiple body parts.
April 28, 2015 WordPress Vulnerability Lets Cybercriminals Insert JavaScript Code via Comments Field 2 min read - A researcher says cybercriminals could exploit a WordPress vulnerability that uses JavaScript in blog comments to cause cross-site scripting attacks.