Apple's forthcoming iOS 8 includes a number of useful new security and privacy features, says Symantec threat researcher Candid Wueest. But there are missing features he'd still like to see implemented.
Can a smart phone increase your privacy and security while remaining both highly usable and attractive to buyers? The inaugural Blackphone is testing that question for consumers and businesses.
Within one day of the disclosure of the flaw known as Heartbleed, an attacker posing as an authorized user broke into a corporate computer system, exploiting the vulnerability in the OpenSSL protocol, the breach detection firm Mandiant says.
Banking institutions have spent the last two years enhancing authentication to conform to regulatory mandates. Organizations in other sectors can learn important authentication lessons from the banking industry.
Cisco has announced a major update to Cisco CCNA and CCNP security certifications to deliver specialized training in IT security to meet the needs of emerging technologies.
RSA SecurID is a two-factor authentication solution that is widely used and regarded as the pioneer product of hardware and software token authentication.
Imagine the scene: You awaken to start your workday, boot up your PC, and suddenly two of your most mission-critical software applications are unavailable.
I've heard many, many comments, analyses, opinions and otherwise regarding the current economic condition of the United States. I've heard that we should blame sub-prime mortgages. I've heard greedy CEOs are to blame. I've even heard that if we (the United States) had universal healthcare, we wouldn't be in this...
Encryption is the method of encoding information using a password, in order to hide the real information from others. The technique is used for various tasks, including secure storage and transferring data between computers and wireless networks.
Storing information on computers is an everyday occurrence for most computer users, both at home and work. Solid state drives, external hard drives, online storage and file servers are some of the common devices used for storing valuable information. Read about each of these below for the common uses of each one.
Financial institutions need intrusion detection systems that incorporate wireless
The biggest credit-card hacking incident in history exploited a weakness in wireless network security that could have easily been fixed. The lesson for financial institutions is to plug all such weaknesses before wrongdoers discover...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.