April 10, 2015 Fake Government Websites Tricking Victims Into Surrendering PII 2 min read - According to the FBI, Americans are being tricked into giving up their personally identifiable information through fake government websites.
April 10, 2015 FFIEC Warns Banks of Malware Attacks, Credential Theft 3 min read - Banks face serious risk from sophisticated malware and credential-stealing attacks, according to a recent alert from the FFIEC to financial institutions.
Application Security April 10, 2015 Social Media Security Tactics: Think Small, Save Big? 3 min read - At Facebook's recent F8 conference, CEO Mark Zuckerberg touched on "small" security tactics the site uses to avoid larger issue down the line.
Banking & Finance April 10, 2015 Chip Card Security: Past, Present and Potential Future 3 min read - Chip card technology has become the de facto standard in Europe, but adoption lags behind in the United States. Are these cards really more secure?
Advanced Threats April 9, 2015 Top Security Myths That Could Leave Your Organization Vulnerable to an Attack 5 min read - These four pervasive security myths may keep organizations from moving to the higher level of security maturity that is needed to fight today's attackers.
April 9, 2015 Security Flaw Pushes Mozilla to Disable Firefox Opportunistic Encryption Capability 2 min read - According to Mozilla, it has disabled its Firefox opportunistic encryption capability after a security flaw that allowed for MitM attacks was discovered.
Endpoint April 9, 2015 Gone Phishing: How to Prevent Sophisticated Attacks 3 min read - Phishing attacks have become much more targeted and alarmingly personalized, exploiting our personal information and the products we use.
Software Vulnerabilities April 8, 2015 The 10 Most Common Application Attacks in Action 4 min read - Based on OWASP's list of the 10 most common application attacks, IBM has created a video series highlighting each one and how organizations can stay safe.
Banking & Finance April 8, 2015 Data Security Requires a Symbiotic Relationship Between the CFO, CIO and CISO 2 min read - As more and more data security incidents have cropped up in recent years, the CFO, CIO and CISO must work together to manage risk to their company.
April 8, 2015 CrypVault Ransomware Locks Out PCs, Demands Payment While Stealing Passwords 2 min read - Researchers say a new strain of ransomware called CrypVault is locking out computer users in a way that resembles antivirus software and demands payment.