The insecurity of the component lifecycle
Open source component use continues to skyrocket with applications now more than 80 percent component-based, while at the same time organizations continue to struggle with …
IT security risks of features in connected cars
In an effort to provide new conveniences as well as meet physical security standards, many new consumer vehicles are offering more complex features. Click the image to view …
New mobile security practice from Trustwave
Trustwave unveiled a new mobile security practice designed to help businesses embrace mobility and BYOD programs while maintaining compliance, managing security risks and …
1010data updates big data analytics platform
1010data released a new version of its cloud-based Big Data analytics platform, which improves the ability of business analysts to quickly glean insights from the largest …
How do you protect yourself in the event of a data breach?
Identity Guard warns consumers to be aware of the increased risk of identity theft and provides tips on how they can help protect themselves from becoming a victim. In a …
Hackers challenged to crack unhackable secure messaging app
Swiss-based U.K. firm Redact has launched a new app which, they claim, offers a completely secure way of exchanging encrypted messages from iPhone to iPhone and even the …
Combat phishing attacks from all email domains
Return Path announced that its Anti-Phishing Solutions have expanded to enable brand owners to combat attacks from all email domains, including those beyond their control. …
AWS cloud computing pros get certification program
With the accelerating adoption of cloud computing and the AWS Cloud around the world, organizations are increasingly seeking mechanisms to identify candidates and consultants …
Fake PayPal “Reset your password” request leads to malware
PayPal customers are being targeted with a fake email impersonating the e-payment service, claiming that their account has been put “on hold” and will stay that …
APT1 cyber espionage group is back to their old tricks
Despite Mandiant’s prediction that the release of their report on the attack methodology of the so-called APT1 (or “Comment Crew”) cyber espionage group …
New Splunk App for Enterprise Security released
Splunk announced the Splunk App for Enterprise Security 2.4. Splunk Enterprise and the Splunk App for Enterprise Security are a security intelligence platform that helps …
FBI wants to fine companies not complying with wiretap orders
The FBI is pushing for a new legislation aimed at pressuring tech companies to create ways for law enforcement officials to be able to wiretap popular communication channels …