The U.S. government has divulged details on the 'Backoff' point-of-sale malware campaign, which purportedly targets remote access software for entry.
News roundup: The 'Fake ID' flaw on Android devices allows malicious apps to impersonate trusted ones, putting confidential data at risk and reigniting BYOD security concerns.
Q&A: Risky app behaviors pose mobile security threats (SearchConsumerization.com)
Mobile security threats come from unlikely places. In this three-question Q&A, MobileIron's security expert offers simple ways IT admin can provide end users the freedom to work securely from their...
A vendor's Heartbleed scan shows that a majority of Global 2000 organizations may still be vulnerable despite patching the OpenSSL flaw.
Corporate boards have increased their awareness of security issues, but experts say they still lack information security principles.
Preview: At Black Hat USA, Point-of-Sale expert Nir Valtman will demonstrate new attacks designed to break point-of-sale security.
News roundup: The revelation of potential iOS backdoors -- and Apple's perceived acknowledgement of them -- has sparked debate over the definition of a backdoor and raised concerns over iOS security.
24 Jul 2014 Applying more military doctrine to network security: Terrain analysis (SearchNetworking.com)
Lancope security research director Tom Cross says network security teams have a lot more to learn from military doctrine beyond the kill chain concept. Find out more about terrain analysis and...
Preview: At Black Hat USA, experts will detail the steps taken by the security community and law enforcement to put down the infamous CryptoLocker ransomware.
Six cyber criminals charged in $1m Stubhub fraud (ComputerWeekly.com)
The US has charged six members of an international cyber crime gang that defrauded Stubhub of $1m
While BlackBerry's CEO touts the mobile platform's security features, experts question whether the advantage over iOS and Android still exists.
Hailed by card brands as the cure to payment card fraud, Chip and PIN security technology will take years to deploy and has already proven vulnerable.
18 Jul 2014 CSA releases new Cloud Controls Matrix and CAIQ standards (SearchCloudSecurity.com)
The Cloud Security Alliance has updated its Cloud Controls Matrix (CCM) and Consensus Assessments Questionnaire (CAIQ) to help enterprises standardize cloud provider security assessments.
With another round of patches for several serious Java flaws, Oracle's quarterly CPU showed that Java security problems are not receding.
Apple expands 2FA feature to boost security (ComputerWeekly.com)
Apple has expanded two-factor authentication for all its services to 48 more countries, bringing the total to 59
Top Security Story
Essential Guide: Windows XP security after end of updates for XP SearchSecurity.com | 08 Apr 2014
Learn about security implications of the April 2014 Windows XP end-of-life date and the end of XP security updates, plus planning an XP migration.