We keep doing the same thing over and over, expecting different results.
Security researcher Benjamin Kunz Mejri from Vulnerability Lab has discovered a serious vulnerability in Apple's App Store and iTunes web apps.
Security experts worry about the privacy and safety risks associated with these devices since the technology is in relative infancy.
New global DDoS attack data shows strong growth in the average size of DDoS attacks, from both a bits-per-second and packets-per-second perspective.
RCS Android can do so many things and spy on so many levels that Trend Micro researchers consider it the most sophisticated Android malware ever exposed.
Infosec consultant Paul Moore came up with a working solution to thwart a type of behavioral profiling. The result is a Chrome extension called Keyboard Privacy, which prevents profiling of users by the way they type by randomizing the rate at which characters reach the DOM.
Whether we think we should be connecting the IoT and our existing systems together or not, the basic imperative to extract business intelligence from the raw information will demand that the connection takes place.
There is still way too much apathy when it comes to data-centric security. Given the sensitive data the OPM was tasked with protecting, it should have had state-of-the-art data protection, but instead it has become the poster child for IT security neglect.
The Internet of Things (IoT) started like any other buzzword: poorly defined, used too often, and generally misunderstood. However, it stood the test of time and is now increasingly becoming part of everyday language, even with those outside the IT world.
Smartwatches with network and communication functionality represent a new and open frontier for cyberattack. HP found that all tested smartwatches contain significant vulnerabilities, including insufficient authentication, lack of encryption and privacy concerns.