Doctors used silicone fingers to fool fingerprint scanner
Fingerprint scanners might not work with severed fingers, but artificial ones still manage to fool them, as proved by the recent discovery of a fraudulent scheme set up by …
Identity fraud is up, but banks are up to the security challenge
In 2012, the total losses resulting from account takeover and new account fraud each rose by approximately 50% over the previous year. These two fraud types impact consumers …
Fake Pope Twitter account proves malicious potential of breaking news
Mere minutes after it become publicly known that Argentinian cardinal Jorge Mario Bergoglio was elected to serve as the new Pope, Internet users around the world began …
Microsoft continues to focus on security in their products
86% of vulnerabilities discovered in the most popular 50 programs in 2012 were in non-Microsoft (or “third-party”) programs. The result was published today in the …
Database security is too complex to implement
A recent GreenSQL survey of IT professionals worldwide concluded that 31.4% of security professionals believe that database security implementation is too complex, making it …
NIST National Vulnerability Database down due to malware
U.S. National Institute of Standards and Technology’s National Vulnerability Database is unavailable, and has been since they discovered malware on some of its servers …
Governance and assurance guidance for big data
Big data can save big money. A recent McKinsey report found that value gained from data in the US health care sector alone could be more than US $300 billion every year. But …
Fight cybercrime with a visit to Infosecurity Europe 2013
Over the last year we have witnessed security attacks against the worlds’ largest organisations, and cyber-attacks which have increasingly been viewed as one of the …
Google unveils site to help webmasters recover their hacked sites
As the most widely used Internet search engine, Google Search is the de-facto starting point for hundreds of millions of queries each day. It you are an administrator of a …
Published celeb credit reports came from government-mandated website
U.S. First Lady Michelle Obama, former California Governor Arnold Schwarzenegger, former U.S. Vice President Al Gore and socialite Kris Jenner are four additional victims of …
Mandiant threat report on advanced targeted attacks
Mandiant released its fourth annual M-Trends report, which details the tactics used by threat actors to compromise organizations and steal data. It also highlights incident …
CSOs must adopt new risk management trends
Wisegate released new research from senior IT security members that shows how CSOs are adopting new risk management trends calling for a risk-based security approach. Security …
Featured news
Resources
Don't miss
- Black Friday 2025 cybersecurity deals to explore
- Quantum encryption is pushing satellite hardware to its limits
- cnspec: Open-source, cloud-native security and policy project
- The privacy tension driving the medical data shift nobody wants to talk about
- Salesforce Gainsight compromise: Early findings and customer guidance