February’s Top Cybersecurity News Stories: Nice Phish You Got There

Last month’s cybersecurity news cycle featured a tricky cryptocurrency-stealing Trojan, targeted phishing attacks, interesting insights about millennials’ identity protection habits and more.

The post February’s Top Cybersecurity News Stories: Nice Phish You Got There appeared first on Security Intelligence.

Continue reading February’s Top Cybersecurity News Stories: Nice Phish You Got There

Read My Lips: Researchers Find Ways to Fool Speech Recognition Systems

Researchers have devised ways to manipulate speech recognition systems to carry out hidden commands, suggesting that cybercriminals will soon develop similar ways to exploit this technology.

The post Read My Lips: Researchers Find Ways to Fool Speech Recognition Systems appeared first on Security Intelligence.

Continue reading Read My Lips: Researchers Find Ways to Fool Speech Recognition Systems

January’s Top Cybersecurity News Stories: Jackpotting, Cryptocurrency Mining and Other Emerging Trends

The start of February is a great time for organizations and individuals to sweep away the confetti and dig into the most significant cybersecurity news stories from the past month.

The post January’s Top Cybersecurity News Stories: Jackpotting, Cryptocurrency Mining and Other Emerging Trends appeared first on Security Intelligence.

Continue reading January’s Top Cybersecurity News Stories: Jackpotting, Cryptocurrency Mining and Other Emerging Trends

Moving Target Defense: A Digital Shell Game

Moving target defense constantly shifts the environment surrounding sensitive data, making it harder for would-be attackers to identify vulnerabilities.

The post Moving Target Defense: A Digital Shell Game appeared first on Security Intelligence.

Continue reading Moving Target Defense: A Digital Shell Game

Wireless Security Lessons From the WPA2 Vulnerability

One of the biggest WPA2 vulnerability wireless security lessons: Few people are aware, fewer know how to patch it and fewer still will do so.

The post Wireless Security Lessons From the WPA2 Vulnerability appeared first on Security Intelligence.

Continue reading Wireless Security Lessons From the WPA2 Vulnerability

Have We Been Wrong All Along About Good Password Practices?

In its new guidelines on secure password practices, NIST recommended using long strings of random words instead of a combination of characters and symbols.

The post Have We Been Wrong All Along About Good Password Practices? appeared first on Security Intelligence.

Continue reading Have We Been Wrong All Along About Good Password Practices?

How Virus Protection Software Has Evolved With the Threat Landscape

Virus protection software has come a long way in the past 30 years, and the advent of machine learning represents a bright future for malware fighters.

The post How Virus Protection Software Has Evolved With the Threat Landscape appeared first on Security Intelligence.

Continue reading How Virus Protection Software Has Evolved With the Threat Landscape

Don’t Leave Home Without These Five Travel Security Tips

Tourists should follow these travel security best practices to protect their devices and data from cybercriminals, especially in foreign countries.

The post Don’t Leave Home Without These Five Travel Security Tips appeared first on Security Intelligence.

Continue reading Don’t Leave Home Without These Five Travel Security Tips

The Enterprise Mobility Conundrum: How to Control the Data?

Businesses can benefit from BYOD policies, but IT leaders must implement the right enterprise mobility solutions to protect their sensitive data.

The post The Enterprise Mobility Conundrum: How to Control the Data? appeared first on Security Intelligence.

Continue reading The Enterprise Mobility Conundrum: How to Control the Data?

The Enterprise Mobility Conundrum: How to Control the Data?

Businesses can benefit from BYOD policies, but IT leaders must implement the right enterprise mobility solutions to protect their sensitive data.

The post The Enterprise Mobility Conundrum: How to Control the Data? appeared first on Security Intelligence.

Continue reading The Enterprise Mobility Conundrum: How to Control the Data?