April 7, 2015 BitTorrent Vulnerability Discovered as Sync Service Exits Beta 2 min read - A research advisory suggests cybercriminals could have exploited a BitTorrent vulnerability to include executable code via URLs in its Sync service.
Banking & Finance April 7, 2015 Momentum Picks Up for Biometric Security in the Financial Sector 3 min read - Biometric security is growing in the financial services industry due to increased accuracy and growing consumer acceptance for the technology.
Intelligence & Analytics April 7, 2015 How to Stay Up-to-Date on Security Trends 9 min read - Following news and threat information and staying up-to-date with the latest security trends can keep your organization and your customers secure.
Software Vulnerabilities April 6, 2015 Determining the Responsibility of a Vulnerability Disclosure 3 min read - When it comes to reporting a vulnerability disclosure, there are many discussions happening about what is right and what is "responsible."
April 3, 2015 New Malware Attacks Hunt for Cracks in Energy Sector Defenses 2 min read - New malware attacks from a cybercriminal group are reportedly being used to find holes in energy sector defenses to gain access to trade secrets.
Application Security April 3, 2015 Mobile Payment Technology: Secure or Subpar? 3 min read - With the growing popularity of Apple Pay, Google Wallet and Venmo, users are wondering whether mobile payment technology is secure and safe to use.
April 2, 2015 Security Researcher: eBay Vulnerabilities Could Have Led to Drive-By Attacks 2 min read - A pair of eBay vulnerabilities could have let cybercriminals hide malware in image files and direct URLs to harmful sites, according to a researcher.
April 2, 2015 Threat Intelligence Report: CIOs and Others Need to Think Smarter About Security 2 min read - A threat intelligence report prepared for the U.K. government suggests IT professionals need better information to protect against cybercriminals.
Healthcare April 2, 2015 How Software-Defined Perimeter Can Help Secure the Clinical Environment 4 min read - The Cloud Security Alliance's Software Defined Perimeter could be a valuable resource for health care providers trying to protect their clinical network.
Application Security April 1, 2015 Dating Apps and Corporate Directories: Dr. Sleuthe Eistheimer’s New Social Security Productivity Powered by Grumpy Cat 3 min read - Data security for apps is vital, but are other lines of business missing opportunities for efficiency from the wealth of insightful apps held by employees?