As Democrats gather in Philadelphia to nominate Hillary Clinton for president, it's a good time to examine the former secretary of state's positions on cybersecurity and online privacy. Here's where she stands.
As the Pokémon Go craze continues to take off, it's clear that when it comes to chasing virtual creatures through real-world locations, too many people fail to keep some common sense guidelines in mind.
In just two years' time, RSA analysts have seen a 170 percent rise in incidents of fraud via the mobile channel. What's behind the spike, and what can security leaders do to help their organizations and customers curb fraud losses?
All fraud hurts, but when compared to other instruments and transaction channels, nothing has the potential to hurt like check deposit fraud. Account take over is still a major problem in the banking industry, and with recent mass compromise events, the risk is on an upswing.
Download this infographic to...
Security firms are warning that they've seen a spike in infections tied to a virulent strain of trojanized Android adware called Shedun - a.k.a. HummingBad - that can root smartphones, survive factory resets and earn cybercriminals big money.
More than half of all Android smartphones have a flaw that can be exploited to bypass the devices' full-disk encryption. As a result, law enforcement agencies - or attackers - could access all supposedly encrypted data being stored on vulnerable devices.
The consumerization of IT and Bring Your Own Device (BYOD) has changed the whole working paradigm of the enterprises. The trend, which has been around for a while, is disrupting the way enterprises and employees access corporate networks and resources and is continuously evolving over time. BYOD is considered the...
BYOD proliferation is challenging IT's ability to deliver enterprise-grade security, manageability, and interoperability. IT departments need complete visibility of all devices, whether managed or unmanaged, that are accessing enterprise data and protected resources.
Download this solution guide to learn how BYOD...
In the latest ISMG Security Report, our editors analyze Symantec's pending purchase of Blue Coat; vulnerabilities in mobile banking apps; retailers' objections to a national data breach notification bill; and the relaunching of the IRS Get Transcript tool after a breach.
Asking how many different technologies consumers will tolerate when it comes to paying for their goods and services is a bit like asking how many more superheroes moviegoers will countenance in the latest "Avengers" film.
In today's rapidly changing cyber threat environment, the federal government needs to take a lead role in making sure mobile device security is adequate, says security researcher Stephen Cobb, who analyzes ongoing investigations by the FTC and FCC in this audio interview.
Ransomware, regulations, botnets, information sharing and policing strategies were just some of the topics that dominated the "International Conference on Big Data in Cyber Security" hosted by Edinburgh Napier University in Scotland.
The FFIEC has released detailed security guidance for mobile banking and payments that its examiners will now use in their assessments of financial institutions. Banking security experts offer a critique.
America's cyber infrastructure is under constant attack, and damage to it could have significant consequences. But the presidential candidates haven't had much to say about the issue. At ISMG's Fraud and Breach Prevention Summit, a panel of experts will address how the next president should tackle cybersecurity.