Topic:

Security

Latest Headlines

Latest Headlines

Ponemon: One third of security professionals never talk with executives

The most eye-opening survey numbers from Ponemon to date imply that no one--absolutely no one--is actually implementing security governance standards as specified.

Security firm warns of 'massive' malware infections impacting WordPress sites

Security firm Sucuri is warning WordPress admins that a "massive" malware infection is wreaking havoc on WordPress websites. Sites with outdated plugins or weak passwords are particularly at risk.    

Spotlight: iOS 7 remains wide open to exploits, says researcher

Among the many things Apple is notorious about not telling people is the architecture of its iOS system services. While on the surface you'd think Apple is operating in the best interests of security, what this means is that an active open source movement has germinated with the explicit goal of ferreting out ways to establish rootkits and other exploitative, stealth services on iPhones and iPads. 

Ping takes a swing at replacing passwords with mobile devices

The system Ping Identity has been building (and to some extent, acquiring) to let people log onto services with their mobile phones is now ready for public launch.

Half-million fraudulent transactions plague Brazil's banks

How often would you let yourself be robbed every single day your business is open, until you decided it might be a good idea to shut the door to the vault?

Spotlight: Tracking how customers' credit card data is collected

The problem with thinking that anonymized databases are safe lies in the presumption that they're separate. They're not, as an in-depth report published not on a tech news site but a real...

Google: Unrestricted search is a human right, EU is interfering

Some 70,000 takedown requests are being handled by hand, according to Google's legal chief, who's now faced with the task of owning up to all the data Google owns.

Scytl e-voting exposes the dangers of automating a democracy

A cryptographic protocol involving secret codes and device-to-device handshakes brings into question whether technology can actually drive away the world's last remaining voters.

Virtualization: A solution for securing mobile identity?

If someone steals your phone then logs onto your apps, those apps may think they're working with you. What if the connection between you and those apps could be severed first?

Ping Identity architect: SAML 'might not be the future'

The identity assertion language that developers adopted for authentication just four years ago may already be outdated, says someone you'd think would be SAML's evangelist.