1 2 3 4 5 6 310 28 / 2170 POSTS
PCI Council Releases Vastly Expanded Cards In Clouds Guidance

PCI Council Releases Vastly Expanded Cards In Clouds Guidance

First word on how card security for containers, VDI, SDN and web apps The Payment Card Industry Security Standards Co ...
Chris Vickery Discusses Data Leak of 48 Million Users by Private Intelligence Firm

Chris Vickery Discusses Data Leak of 48 Million Users by Private Intelligence Firm

SAN FRANCISCO – Profile data of 48 million users that was scraped from social networks and websites ranging from Facebook, LinkedIn, Zillow and Twitte ...
Use of ‘StegWare’ Increases in Stealth Malware Attacks

Use of ‘StegWare’ Increases in Stealth Malware Attacks

SAN FRANCISCO – Researchers are warning of an uptick in the malicious use of steganography as a vehicle for delivering malware. Steganography, they sa ...
Bitcoin Heist Suspect Reportly Walked Out Of Low-Security Prison, Onto Flight

Bitcoin Heist Suspect Reportly Walked Out Of Low-Security Prison, Onto Flight

Enlarge / The view taking off from Keflavik International Airport.Eric Salard / FlickrOne of the suspects arrested in Iceland’s "Big Bitcoin Heist" ha ...
Paul Kocher weighs in on Spectre flaws, vulnerability disclosure

Paul Kocher weighs in on Spectre flaws, vulnerability disclosure

SAN FRANCISCO -- Five months after his vulnerability discovery rocked the technology industry, security researcher Paul Kocher shared his thoughts on ...
How to use a strong passcode to better secure your iPhone

How to use a strong passcode to better secure your iPhone

With police departments and federal agencies lining up to buy technology from two companies whose products can bypass iPhone security mechanisms, expe ...
iOS Sync Glitch Lets Attackers Control Devices

iOS Sync Glitch Lets Attackers Control Devices

SAN FRANCISCO – Researchers have identified a new iOS vulnerability called “trustjacking,” which exploits a feature called iTunes Wi-Fi Sync to give a ...
1 2 3 4 5 6 310 28 / 2170 POSTS