Security News & Reviews - Page 2
More Security News
DAILY VIDEO: How Mastercard is improving fraud detection With Identity Check, and Huawei gets into the Arm server chip game.
The new 8.2 release of the server edition of FireEye Email Security includes advanced capabilities to help organizations defend against email impersonation and malware delivery attacks.
Imperva's State of Web Application Vulnerabilities in 2018 report reveals that there were 17,142 web application vulnerabilities in 2018, with injection vulnerabilities leading the way.
NEWS ANALYSIS: As software, like Apple's IOS mobile operating system, increasingly becomes the cornerstone of society, the value of vulnerabilities that enable software exploitation continues to rise.
In 2018, IBM was granted over 1,400 cyber-security related patents for innovations, including a new approach to help stop voice phishing attacks and improvements to how data is correlated to detect potential threats.
DAILY VIDEO: Enterprises can avoid the Ryuk ransomware with the right strategy, and CastHack exposes Google Chromecast device users to risk.
NEWS ANALYSIS: The House of Representatives is considering H.R. 1, an omnibus bill that includes a number of election security measures, along with a wealth of other provisions.
eWEEK DATA POINTS: Master Product Manager for Oracle Database shares with readers some best practices on how organizations can better secure their data at the database level.
Mastercard is implementing the EMV 3-D Secure 2.0 specification in an effort to help improve the overall experience of online credit card payment authorization.
Serverless computing offers new opportunities for cloud efficiency, but it also comes with new risks that Protego Labs is looking to help enterprises better understand.
NEWS ANALYSIS: Last month, a pair of security researchers demonstrated how it’s possible to fool a vein recognition system, but they also showed just how hard that actually is to do. New-gen scanners work a lot better now than they did previously, but like any biometric reader, they can be...
Detecting fraudsters calling into an organization's phone system can occur even before the hacker picks up the phone, with technology that Neustar has now gained from Trustid.