Attacks are intensifying, and have already claimed 10 million personal records.
SecureAuth Adds Risk-based Authentication Scheme
Latest stab at “post-password” security adds live threat intelligence to the mix.
Xiaomi Issues Update After Data Privacy Concerns
MIUI Cloud Messaging made opt-in after negative feedback.
Need Data Breach Statute Compliance? There’s an App for That
Data Breach 411 for Apple OS gives executives all the state security breach statutes at their fingertips.
Click Fraud Malware Found Lurking Inside Image Files
Dell SecureWorks researchers warn of growing threat from digital steganographic techniques.
XSSposed Aims to Call Out Compromised Websites
The public archive of compromised websites is meant to motivate companies to patch simple vulnerabilities.
Sophisticated Spy Campaign Targets Former Eastern Bloc Countries
Espionage malware has persisted in embassies and state offices for at least four years.
BlackHat 2014: Mobile Point of Sale Devices at Risk from Hackers
Hackers can take over mobile point of sale devices through various means, including inserting a maliciously crafted card.
BlackHat 2014: Medical Device Security Not as High Risk as Previously Claimed
While it’s true that medical devices are vulnerable and can be tampered with, these attacks are still in the realm of unlikelyhood.
BlackHat 2014: Square Launches Bug Bounty Program
The program has paid $250-$1,500 per bug for uncovering card payment issues.