At a recent conference on “the future of wearables” I was asked to speak about security. I think my presentation surprised some...
If many endpoints’ traffic pass through the VM host, why not move security there, sort of catch “bad things” before they even...
Lysa Myers, a security researcher at ESET, looks at the diversity challenges and opportunities in information security - while there is much...
ESET security researcher Lysa Myers looks at a few of the questions she has been hearing more often about the recent surfeit...
Some of the good things in store for those attending Virus Bulletin 2015.
The Ashley Madison data breach has created fresh cybersecurity threats for all organizations. A company response plan is needed. Here's what you...
Cybersecurity topics and panels were rated one of the “6 Best Things” at the recent Campus Tech conference, in Boston.
With children gradually going back to school in Latin American regions, it’s time to remind our children of the importance of IT...
Security researchers found a vulnerability in Android that could allow attackers to steal information from smartphones through remotely executed code via a...
If Black Hat is becoming the new RSA, then DEF CON is oozing toward Black Hat, it seems, and B-Sides is the...
This year at Black Hat, the focus was as much on hacking the intersections of data as on a specific computer platform.
Blackhat grew! Not only did the hacker types leave their mom’s basement and get jobs, some even were forced to start explaining...
It's not all about crashing cars and hacking guns: what's hot at Black Hat 2015 USA (#BHUSA) and how to get the...
There are three fundamental elements that must not be overlooked when starting out in corporate security, summarized as the 'ABC of information...
How homograph attacks can present a spoofed, malicious link, and a case where a secure connection doesn't guarantee a safe site.
Every June, a select group of students from high schools and middle schools in San Diego County, California, get five days of...
With the deadline for the switchover now just months away, how are vendors doing? Have they begun the conversion already, or will...
Smartphone authentication: is biometric technology ready to replace PINs and passwords?
iOS and OS X the most vulnerable operating systems? Don't confuse vulnerabilities with exploits, or patch frequency with insecurity.
Two phone scams of a type that might be new to you: fake surveys asking dangerous questions, and a Londoning scam that...
The recent opening of the Hacker List portal brings to mind the age-old question: Would you hire a hacker?