More often than not, data breaches come from employees or system errors, not outsiders.
What does it take to execute a successful spam operation peddling diet pills of questionable effectiveness? For one spammer, it took some 750,000 fake Twitter accounts.
A critical Android vulnerability can be exploited by attackers to trick users into downloading malicious apps from third-party stores.
Researchers have discovered a new method to breach air-gapped computer systems called “BitWhisper” which enables two-way communications between adjacent, unconnected PC computers using heat.
Premera has been deemed compliant with the Health Insurance Portability and Accountability Act (HIPAA) in late November 2014.
Nathan Horn-Mitchem, VP, Information Security Officer at Provident Bank, talks about delivering and maintaining IT security for 80 branches of the bank.
The boundaries of what defines a bank or payment provider are blurring, with innovators such as Apple and PayPal now competing in this space. They are forcing banks to consider how they can deliver the frictionless user experience that consumers now demand.
How do we balance the benefit of the free flow of information with the risk of inappropriate access and/or disclosure? What are the consequences of not doing so?
In this interview, Raj Samani, VP and CTO EMEA at Intel Security, talks about successful information security strategies aimed at the critical infrastructure, government challenges, the role of regulation, and more.
If you rely only on traditional, signature-based antivirus, you are going to get infected—and probably a lot! Antivirus was, and still is, a valuable addition to your layered security strategy, but only if you understand its limitations.