Disrupting Nation State Hackers With the Security Basics
Earlier this year at the USENIX Enigma information security conference held in…
Flash Vulnerabilities & Exploits: An Information Security Primer
Adobe Flash Player is used to create and play animations, video games,…
Data Breach Lawsuits Revived: Court Turns in Favor of Consumers
A data breach may be in the news one week and out…
Securing Against Domain Hijacking with Strong Access Controls
Hosting registrars for regional Lenovo and Google domains were hijacked last month,…
Criminals Leverage Apple Pay for Fraud: Banks Boost Authentication Security
Apple Pay hasn’t been hacked. But it does provide a new way…
Attackers Find Value in the Master Key to Password Managers
A treasure trove of passwords, plus the keys to unlock multiple accounts…
Dynamic Cybersecurity Needs: Reassessing Security
As a recent report on Defending Data by Nuix found, cybersecurity needs…
Answer to OTP Bypass: Out-of-Band Two-Factor Authentication
Trend Micro’s one-time password (OTP)-based two-factor authentication bypass report (PDF) is hardly…