
Fraud data shows 680% spike in fraudulent mobile app transactions
The number of fraudulent transactions originating from a mobile app during the first quarter has increased by 200 per cent since 2015, according to RSA Security. Analysis from …

Realistic, well-positioned Reddit clone is out to grab users’ login credentials
A convincing clone of the popular social news aggregation and discussion site Reddit has been spotted on the reddit.co domain. The author is obviously counting on users not to …

Why cryptography is much harder than software engineers think
The recent ROCA vulnerability (CVE-2017-15361) raises some important issues about the design of secure cryptographic software. The vulnerability is not in this case an obvious …

Vulnerability in code library allows attackers to work out private RSA keys
Researchers have discovered a security vulnerability in the Infineon-developed RSA library, which could be exploited by attackers to discover the RSA private key corresponding …

New infosec products of the week: July 21, 2017
Awake Security unveils advanced security analytics solution Awake’s advanced security analytics provide security teams the insights needed to understand the scope and impact …

Overreliance on perimeter-based defense creates opportunities for attackers
RSA has announced the results of research that demonstrates organizations in Asia Pacific & Japan (APJ) investing in detection and response technologies are better poised …

75% of organizations have serious cybersecurity risk exposure
Organizations that invest in detection and response technologies, rather than perimeter-based solutions, are better poised to defend against cyber incidents. The second annual …

How effective are orgs at detecting and investigating cyber threats?
A new threat detection effectiveness survey compiling responses from more than 160 respondents around the world has provided valuable global insight into what technologies …
Does size matter when it comes to cybersecurity?
RSA released its inaugural Cybersecurity Poverty Index that compiled survey results from more than 400 security professionals across 61 countries. The survey allowed …

Adding context to security data to achieve visibility into attacks
At RSA Conference 2015, RSA announced new capabilities have been added to its Security Analytics solution, which is engineered to give organizations the necessary context to …

Protecting identities from the endpoint to the cloud
At RSA Conference 2015, RSA launched the RSA Via family of Smart Identity solutions, engineered to combine authentication, identity and access management, and identity …

Security industry has failed, it’s time to chart new course
In front of computer security professionals attending RSA Conference 2015, Amit Yoran, president of RSA, The Security Division of EMC, challenged the industry to relinquish …
Featured news
Resources
Don't miss
- Building cybersecurity culture in science-driven organizations
- How Kim Crawley challenges big tech in “Digital Safety in a Dangerous World”
- Google strengthens secure enterprise access from BYOD Android devices
- Southwest Airlines CISO on tackling cyber risks in the aviation industry
- Insider risk management needs a human strategy