Security experts see good news and bad in Apple's latest announcements. Upsides include Apple Pay and numerous privacy and security improvements in iOS 8. But after the celebrity photo leak, iCloud fixes remain missing.
Apple has announced a new payment feature known as Apple Pay for its latest iPhones that uses NFC technology to conduct transactions. Security and payment experts say the move eventually could help improve payment security.
Apple plans to add safeguards to help address security vulnerabilities exploited by celebrity photo hackers. But some security experts contend that the proposed changes won't block iCloud account hackers.
To avoid the corporate equivalent of the recent celebrity photo dump from iCloud, enterprise security managers must add stronger password, encryption and authentication controls to mobile devices.
2014 has seen an explosion of mobile banking demand and services. But as the channel grows, so do the threats against it. What are today's top threats, and how can institutions offer more secure mobile banking?
Initial reports suggested that Russian hackers could behind an attack against JPMorgan Chase, and perhaps other U.S. banks. While it's still far from clear who the culprits are, experts discuss the potential hacking motivations of a nation-state.
2014 has seen an explosion of mobile banking demand and services. But as the channel grows, so do the threats against it. What are today's top threats, and how can institutions offer more secure mobile banking?
White House Cybersecurity Coordinator Michael Daniel is under fire for perceived 'bragging' about his lack of technical expertise. But was Daniel, in fact, bragging? And is he off base in saying his job doesn't require deep technical experience?
As more organizations accommodate employees' demands to use mobile devices, ensuring the security of the applications on those smart phones and tablets has become critical. That's why NIST is developing new apps testing guidance.
Apple's forthcoming iOS 8 includes a number of useful new security and privacy features, says Symantec threat researcher Candid Wueest. But there are missing features he'd still like to see implemented.
PeaceHealth, a healthcare system in the Pacific Northwest, has devised a practical way to apply the NIST Cybersecurity Framework to its breach prevention efforts. Learn about the steps involved.
The killing of an unarmed teen by police in Ferguson, Mo., has Anonymous sympathizers disagreeing on Twitter when and how to expose the identity of the shooter.
Can a smart phone increase your privacy and security while remaining both highly usable and attractive to buyers? The inaugural Blackphone is testing that question for consumers and businesses.
IT security expert Bruce Schneier, now the chief technologist at an incident response provider, sees tools that help enterprises respond to a data breach being used for other unexpected events.
To honor our loyal readers, and to invite even more of their comments, we're debuting a new, weekly infographic entitled ISMG Buzz, in which we offer a "best of" compilation of the latest insights.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.