Microsoft Adds Project Spartan, Azure to Bug Bounty Program
The changes reflect the continued shift and evolution of technology towards the cloud, and take aim at Windows 10.
Galaxy S5 Flaw Allows Hackers to Steal and Clone Fingerprints
Attackers can remotely intercept and collect fingerprint information as it’s transmitted from the sensor to the encrypted “safe zone.”
(ISC)2 Names GISLA Finalists
The honorees for the 12th annual Government Information Security Leadership Awards are out, including contenders for a new "up-and-coming" category.
Trend Micro Wins Legal Dispute With Patent Troll
Copyright lawsuit shelved after judge sides with security giant
‘Dead Apps’ Are Biggest BYOD Risk
Applications removed from official app stores pose major threat
Expert Raises Hacking Concerns Over Network Rail Upgrade
New digital signaling system could be vulnerable to insider threat
FTC Censures Nomi for Secretly Tracking Consumers in Stores
The FTC said that Nomi collected information on about nine million mobile devices within the first nine months of 2013.
Awareness Grows for File Transfer Security, But Still Work to Do
Many organizations, especially in healthcare, are still using insecure file services like the consumer version of Dropbox.
Bad Actors Target Websense Employees in Wake of Raytheon Deal
Emails with the subject “Welcome to join Raytheon!” signaled the kickoff of an ambitious attack.
Attackers Focus on Vulnerability Exploits in 2H 2014 – Report
New tactic to target North American and European victims
Rights Groups Slam US Cyber Info Sharing Bills
Legislation could give green light to more invasive surveillance
Former CIA Boss Petraeus Gets Probation After Leaking Secrets
Ex-general walks free at end of sorry two-year case