May 29, 2015 IRS Data Theft Taxes Patience of 100,000 Users 2 min read - News of an IRS data theft reveals that 100,000 tax returns were stolen using "Get Transcript," prompting $50 million in fraudulent refunds.
May 27, 2015 New Android Ransomware Goes After XXXtra Cash 2 min read - New Android ransomware is locking down mobile phones with fake FBI warnings for looking at adult content and demanding MoneyPak codes for release.
May 27, 2015 Effectiveness of Security Questions Called Out in New Study 3 min read - The effectiveness of security questions has been called out in a new Google study. Are user answers really as unique as they ought to be?
May 27, 2015 IC3 Internet Crime Report Shows Social Media Complaints Have Quadrupled in Five Years 2 min read - Social media-related scams including clickjacking, doxing and pharming are noticeably on the rise, based on the recent IC3 Internet Crime Report.
May 21, 2015 Logjam Flaw May Open Data to Cybercriminals by Fooling Web Browsers 2 min read - Researchers say the Logjam flaw could fool Web browsers and servers into using weak encryption keys, allowing cybercriminals to intercept and decode data.
May 21, 2015 Security Analytics Gets Top Marks but Low Numbers — What Gives? 2 min read - Security analytics gets top marks from IT pros but scores low in penetration. What's preventing this new technology from gaining ground?
May 21, 2015 Adware Identified as Second-Biggest Security Threat of 2014 3 min read - Adware programs that are designed to render advertisements on end user systems emerged as the second-most prevalent security threat in 2014.
May 20, 2015 How a Fake Password Project Could Make Cybercriminals’ Lives Difficult 2 min read - Researchers have created a fake password project that would allow companies a way to potentially limit the damage of leaked login information.
May 20, 2015 Data Protection: Are Humans the Weakest Link? 2 min read - Are humans the weakest link in data protection? A recent report from law firm BakerHostetler suggests this is case. Can companies mitigate the issue?
May 18, 2015 Second Sally Beauty Data Breach in 15 Months Highlights POS Threats 3 min read - A data breach at Sally Beauty Holdings — the second in just over a year — highlights POS security risks currently facing businesses of all sizes.