March 15, 2017 Meet Havyn, the Voice of the Cognitive Security Operations Center (SOC) 2 min read - For the next step in its journey toward the cognitive era, IBM introduced Havyn to provide threat data to IBM Managed Security Services clients on demand.
March 14, 2017 Vehicle Location Services Cloaked in MOPs 2 min read - MOPs may allow a vehicle to cloak its position information from location services by using all radio communication channels available to it.
March 14, 2017 Pre-installed Mobile Malware Targets Android Users 2 min read - Security researchers have detected 36 Android phones with mobile malware pre-installed on the devices, bringing a wave of fresh concerns to enterprises.
March 14, 2017 Got SAP HANA? Your Calendar Just Filled Up With Zero-Day Critical Vulnerabilities 3 min read - SAP HANA customers should invest in an active threat monitoring and detection solution — meaning a SAP-specific threat vector detection.
March 14, 2017 See No Evil? Facebook Puts the Brakes on Social Data for Surveillance 2 min read - Facebook has updated its privacy policy to stop developers from using social data for surveillance tools — but is this too little, too late?
March 13, 2017 MAC Address Randomization Gets Clobbered 2 min read - MAC address randomization can be defeated with 100 percent accuracy, according to a new report from U.S. Naval Academy researchers.
March 13, 2017 The State of Mobile Security: Change, Challenge and the Consumer Mindset 2 min read - Mobile security is becoming an increasingly tall task for enterprises. One of the biggest challenges is changing the consumer mindset that users have.
March 13, 2017 Explore the IBM Security App Exchange at IBM InterConnect 2017 2 min read - Experts and industry leaders will showcase the IBM Security App Exchange and the power of collaborative defense at InterConnect 2017.
March 9, 2017 New Security Ratings Could Help Bolster User Confidence 2 min read - The decision by Consumer Reports to include security ratings in its product reviews could have implications for the way connected devices are designed.
March 9, 2017 SGX Malware Extracts RSA Key in Five Minutes 2 min read - Researchers at Graz University of Technology in Austria developed a novel SGX malware attack that can extract an RSA key in under five minutes.