iOS 8 will randomize devices’ MAC address to increase privacy
The next major release of Apple’s iOS mobile operating system will include an important change: when local wireless networks scan for devices in range, devices running …
Is your data already out there?
CIOs cannot underestimate the creativity of online organized criminals to quietly penetrate their IT systems through a growing area of vulnerability: employees and vendors, …
Payment card breach at US restaurant chain P.F. Chang’s
Asian-themed US restaurant chain P.F. Chang’s China Bistro has apparently suffered a breach that resulted in the theft of customers’ payment card data. The extent …
Mobile apps will have a significant impact on information infrastructure
With digital business blurring the line between the physical and the digital worlds, consumer-centric mobile apps are playing an important role, according to Gartner. Gartner …
World Cup 2014 fans are not the only ones with their eye on the ball
The World Cup 2014 championship has begun and like most major sports events, employees are browsing websites to check the latest scores, watch streaming live games and chat …
Microsoft delivers seven advisories
Patch Tuesday, June 2014 delivers seven advisories, of them, two critical, five important – one of which is the seldom seen “tampering” type. The remarkable …
1Password 4 for Android released
AgileBits has released 1Password 4 for Android, a pixel-to-bit reinvention of its industry-commanding password manager and secure wallet for Android phones and tablets. As a …
Security at higher education institutions
SANS announces results of its inaugural survey of security in institutions of higher education, in which nearly 300 higher education IT professionals answered questions about …
Crypto-ransomware brings in quite a profit
Crypto-ransomware is quickly becoming cybercrooks’ favorite tool to extort money from computer users. After the amazing success of CryptoLocker, copycats have begun …
Retail breaches and the SQL injection threat
Continuous monitoring of database networks is the best approach to avoid breaches such as the high-profile attacks against major U.S. retailers, according to a Ponemon …
World Cup Brazil 2014: How cybercriminals are looking to score
Starting this week, 32 national teams and thousands of football fans will descend on Brazil for the 2014 FIFA World Cup. Right now the teams are fine-tuning their strategies …
Security software market grew 4.9 percent in 2013
Worldwide security software revenue totaled $19.9 billion in 2013, a 4.9 percent increase from 2012 revenue of $19.0 billion, according to Gartner, Inc. The …
Featured news
Resources
Don't miss
- Why your security team feels stuck
- It’s time to give AI security its own playbook and the people to run it
- Kanvas: Open-source incident response case management tool
- 6 eye-opening books on AI’s rise, risks, and realities
- Check for CitrixBleed 2 exploitation even if you patched quickly! (CVE-2025-5777)