Security News

Account takeover continues to be a lucrative path for fraudsters across all industry sectors. But Scott Olson of iovation says there are different levels of defense that can be deployed, based on...

Willie Sutton and mobile attackers have much in common -- but defenses have evolved since the famous bank robber had his heyday.

Facebook has announced the 2019 winners of the Internet Defense Prize, an award offered in partnership with USENIX. Created in 2014, the award is meant to recognize and reward research that...

Make Sure You Understand the Root Cause of the Vulnerabilities or Attack Vectors Behind the Next Over-Hyped Stunt Hack Every year, at least one mediocre security vulnerability surprisingly...

Companies are under constant threat. Opportunistic attackers scan the internet for weak points, motivated attackers target specific organizations for susceptibility to a scam or digital exploit,...

Samsung Electronics America announces that its flagship products continue to obtain federal certification with the recent approval of the Samsung Galaxy S10 series, Note9 and Galaxy S9 join the...

It was not that long ago when one of the measures of a company’s maturity was whether it had its own data center or not. In some cases, the data center occupied one or two floors in the company’s...

Fortinet's FortiGuard Labs global threat research team is creating research playbooks that provide deep-dive analysis of not only threat trends, but also cybercriminal and adversary tools and...

Researchers demonstrate a new side-channel attack that bypass mitigations against Spectre and Meltdown.

IT departments tend to be concerned primarily with cybersecurity attacks that originate from outside the enterprise, known as a “north-south” attacks. This often leaves them more vulnerable to...