Latest News

Identity and Access Management

Android Malware Hijacks Voice Assistant Android Malware Hijacks Voice Assistant

The bug needs no permissions to carry out its deeds.
30 July 2014

One in Three Ex-employees Can Access Corporate Networks One in Three Ex-employees Can Access Corporate Networks

Research shows that insider threats continue long after job termination.
24 July 2014

Emmental Hackers Pick Holes in Online Banking to Nab Account Details Emmental Hackers Pick Holes in Online Banking to Nab Account Details

Researchers uncover sophisticated, multi-stage attack designed to bypass two-factor authentication.
24 July 2014

StubHub Breach Part of a Coordinated, International Cybercriminal Ring StubHub Breach Part of a Coordinated, International Cybercriminal Ring

Law enforcement agencies in several countries have carried out a joint disruption of the alleged perpetrators.
23 July 2014

New York Seeks to Tame the Wild West of Bitcoin New York Seeks to Tame the Wild West of Bitcoin

Stringent anti-criminal provisions seek to put a stop to virtual currency's notorious role as the crime-cash of choice.
21 July 2014

Password Misuse is Rampant at US Businesses Password Misuse is Rampant at US Businesses

Endemic bad practices invite criminals to have a field day.
21 July 2014

Irish Privacy Watchdog Steps in as Government Site Exposes Citizens’ Data Irish Privacy Watchdog Steps in as Government Site Exposes Citizens’ Data

Genealogy portal inadvertently gave cybercriminals a head start with personal info.
21 July 2014

Critroni Ransomware Makes Its Way into the Wild Critroni Ransomware Makes Its Way into the Wild

Tor and key-based encryption anchor this sophisticated malware.
20 July 2014

LinkedIn Users Hit With New Phishing Scam LinkedIn Users Hit With New Phishing Scam

Latest phony email claims recipient’s account has been blocked.
18 July 2014

Privileged Accounts at Root of Most Data Breaches Privileged Accounts at Root of Most Data Breaches

A survey suggests that this vulnerability is the most critical in any organization.
17 July 2014

Showing 1 - 10 of 1,056 articles
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×