Even malware slingers sometimes forget basic security best practice
Insider Thieves Pilfer High-finance Trading Algorithms
The algorithm information can be used for blackmailing companines or selling it to other traders on the black market.
(ISC)2 Opens GISLA Nominations
This year’s GISLA program will recognize government information security professionals who see opportunity in crisis, whether in federal or state/local service.
Hackers Spend 200+ Days Inside Systems Before Discovery
M-Trends report notes drop in average detection time but plenty to keep security teams busy
McAfee Warns of Persistent Mobile MITM Flaws
Unpatched SSL vulnerabilities could be exposing millions to attack
Telegram’s ‘Encrypted’ Mobile Chats Easily Hacked
A critical vulnerability exposes more than 50 million users who believe the app provides the security to chat freely.
Google Wallet, CloudPay Take Aim at Mobile Payment Ubiquity
Options for turning mobile devices into payment mechanisms are making their way to the mainstream market.
Norton Update Breaks Internet Explorer
Security giant forced to do emergency repairs over the weekend
Lenovo Releases Superfish Removal Tool
Users finally have means to uninstall controversial adware
American Sniper Takes Home the Award for…Most-Pirated Film
Oscar nominations sparked a triple-digit uptick in piracy, costing studios as much as $40 million in lost revenue.