It has been reported that 16 companies from around the globe have exposed credit card data during payments to their…
Browsing: Identity and Access Management (IAM)
As 2015 draws to a close, researchers from Proofpoint have analysed some of the key threats of 2015 and made…
The Juniper issue that Administrative Access (CVE-2015-7755) allows unauthorized remote administrative access to the device. Péter Gyöngyösi, product manager of…
As a Spanish national, I was a little bit surprised to see how the UK, and in particular London, came…
Flexera Software report reveals that popular shopping apps, including Amazon, Disney Store and eBay can access iOS devices’ contacts, calendar,…
Imperva has been in the business of protecting the high-value applications and data assets at the heart of the enterprise…
It is being reported that a security researcher looking into the breach of California University Housing Files, discovered Cyberattackers had…
Vulnerable web application is just one of the great gifts left for hackers, as it significantly reduces their time, cost…
A database for sanriotown.com, the official online community for Hello Kitty and other Sanrio characters, has been discovered online by…
Calls for Instagram to add extra layer of security In a step to better protect users and reduce fears related…