Making Identity and Access Management Work for You

There are many reasons why some enterprises struggle with their Identity and Access Management (IAM) strategies, but it's often not the types of authentication being explored. Too many companies still think of IAM...

Isolated, Air-Gapped Cypto-Wallets Hacked – Infosecurity Magazine

He who holds the private keys owns all of the bitcoins. For those who manage their cryptocurrency in offline, or "cold," wallets under the premise that they cannot be compromised, recent news from researcher...

Now Amazon wants the keys to your car

If you weren’t finding the prospect of Amazon delivering your Prime packages by drone, or Amazon delivery staff being given temporary access to your house to leave parcels in your hallway, evidence that...

Police try (and fail) to unlock phone with a dead man’s finger – Naked...

Lisa Vaas Lisa has been writing about technology, careers, science and health since 1995. She rose to the lofty heights of Executive Editor for eWEEK, popped out with the 2008 crash...

Exploit Targets Nvidia Tegra-Based Nintendo Systems | Threatpost

Google Play Boots Three Malicious Apps From Marketplace Tied to APTs ...

Baseball Code – Schneier on Security

Blog > Baseball Code Info on the coded signals used by the Colorado Rockies. ...

MEDantex Healthcare Transcription Firm Accidentally …

Exposed data likely the result of a flawed system rebuild after a recent ransomware attack on the company.MEDantex, a healthcare transcription service based in Wichita, Kansas, shut down its customer portal when it...

Transcription Service Leaked Medical Records — Krebs on Security

MEDantex, a Kansas-based company that provides medical transcription services for hospitals, clinics and private physicians, took down its customer Web portal last week after being notified by KrebsOnSecurity that it was...

Celebrate National Telephone Day by Securing Your Mobile Devices

April 25 – otherwise known as National Telephone Day – rolls around once a year to remind us of the sheer technologic prowess and influence of the phone. What first started as an...

Report finds that ransomware to be most dominant malicious software

Social engineering attacks that involve pretexting nearly tripled on an annual basis while phishing simulations show that curiosity gets the better of 4% of people. Ransomware takes the cake as the most prevalent type...

LATEST NEWS

MUST READ