Research uncovers database security disconnect
As a greater portion of business operations and communications are migrated to online platforms, it is becoming clear that the burden of information security is too great for IT personnel alone....
View ArticleCompanies should do more to secure information at data level
As companies are growing more adept at producing and storing large amounts of data, their habits for securing and protecting the information haven't quite caught up, according to a new report from risk...
View ArticleResearchers track consequences of lost mobile devices
Business professionals have heard time and again that a lost or stolen smartphone or tablet can become a serious liability. Researchers from Symantec have put these advisories into context after a...
View ArticleSecurity researcher demonstrates NFC’s potential as hacking tool
Earlier this week at the Black Hat USA 2012 conference, former National Security Agency employee and current Accuvant principal research consultant Charlie Miller demonstrated what could very well be...
View ArticleReport: Evasive malware outflanking signature-based defenses
With clever cybercriminals continuously refining trusted tactics and developing new attack strategies, IT professionals have come to understand that network security will always be a moving target. Yet...
View ArticleNIST selects next encryption standard
Following concerns that the third iteration of the secure hash algorithm (SHA-2) may be vulnerable to attack, the National Institute of Standards and Technology (NIST) issued an open call in 2007 to...
View ArticleMegaDroid projects testing mobile security at scale
The Sandia National Laboratories, originally founded to develop and test non-nuclear components of nuclear weapons for the Department of Energy during the Cold War, have been a fixture within the...
View ArticleResearch outlines mobile app privacy disconnect
As mobile applications evolve from occasional accessories into ubiquitous utilities, security researchers are hoping to get a grip on privacy implications before it's too late. Analysts from Juniper...
View ArticleDDoS, SQL injection top cybercriminal priority lists
Knowing your adversary's next move is an invaluable advantage when it comes to securing corporate networks. And although hackers are a notoriously unpredictable lot, researchers from Imperva recently...
View ArticleHackers could pervert power of the cloud for new attacks
The seemingly limitless computational power of cloud computing is among the technology's most attractive value propositions, but placed in the wrong hands, it could fuel untold danger. According to a...
View Article
More Pages to Explore .....