Internal investigation reveals three breaches in past three years, twice foreign related and once unidentifiable.
- By Ginger Hill
- Aug 19, 2014
The product can be used on Windows, OS X, Android, and iOS
Almost half of consumers would never use mobile payment and banking apps due to fears about the level of security on their devices, with suspicions highest in the over 55 age group.
Movie quotes offer great insights and knowledge to enhance the security industry.
- By Ginger Hill
- Aug 13, 2014
- By Matt Holden
- Aug 12, 2014
Two researchers planned to reveal their findings at Black Hat USA.
- By Matt Holden
- Aug 08, 2014
Breakthrough encryption and tokenization technologies deliver a new level of safety in today’s risk-prone, online transactional world.
The company says it has all the markings of a state-sponsored attack.
- By Matt Holden
- Aug 07, 2014
4 ways to battle this social media giant to beat them at their own game.
- By Ginger Hill
- Aug 06, 2014
Russian hackers stole 1.2 billion passwords resulting in the largest collection of stolen internet information.
- By Matt Holden
- Aug 06, 2014
The internet company found illegal images in his Gmail account.
- By Matt Holden
- Aug 05, 2014
Simplify the process of accessing multiple resources for productivity and collaboration to a "sign and done" experience.
- By Jason Dover
- Aug 05, 2014
A security breach in June might have led to customer data theft.
- By Matt Holden
- Aug 04, 2014
Place a round, nickel-sized sticker on your skin where it’s easily accessible and tap your smartphone on the sticker to unlock it.
- By Ginger Hill
- Aug 04, 2014
While the adoption of biometrics has never been more widespread, highly-successful security- and privacy-enhancing applications have been deployed worldwide across all industries; yet, the general public narrative remains focused more on the risks rather than the benefits.
- By Phil Scarfo
- Aug 01, 2014
Reverse engineered firmware revealed an embedded controller chip that could be the beginning of wreaking havoc on computer systems.
- By Ginger Hill
- Jul 31, 2014
Questions still remain about the implementation and effectiveness of this rule.
- By Matt Holden
- Jul 25, 2014
Typewriter sales in German economy boom as tool to thwart cyber spying.
- By Ginger Hill
- Jul 25, 2014
Enhancements give developers access to a single stack of development-language-agnostic APIs for both card-present and card-not-present transactions, allowing for easier integration across all channels.
Authorities to announce the who they arrested and the number people victimized.
- By Matt Holden
- Jul 23, 2014