White House Employees fell victim to the Syrian electronic Army’s Social Engineering attack – Their personal email accounts have been hijacked by Syrian Electronic Army.
Browsing: Identity and Access Management (IAM)
Researchers at Securi discover Credit Card Redirection attack technique to hijack credit card data during transactions on e-commerce sites.
Turkish security researcher Ibrahim Balic now claims he was behind the attack Apple admitted to in a statement to its developer network last Thursday, July 18, saying that sensitive personal information of some 275,000 members may have been compromised.
Trusteer, the leading provider of endpoint cybercrime prevention solutions, today announced the general availability of the Trusteer Cybercrime Prevention Architecture for e-commerce.
Facebook-for-bosses website LinkedIn has fixed a security vulnerability that potentially allowed anyone to swipe users’ OAuth login tokens.
There’s a funny catch-22 when it comes to privacy best practices. The very techniques that experts recommend to protect your privacy from government and commercial tracking could be at odds with the antiquated, vague Computer Fraud and Abuse Act (CFAA).
If there are any lingering doubts that mobile devices have profoundly transformed today’s business, one study finds that using smart devices for productivity is “now the standard.”
From late 2007 until March 2011, if you were an identity thief or credit card fraud artist in need of a fake ID, your best bet was “Celtic’s Novelty I.D. Service.”
Symantec has bought enterprise-focused authentication software start-up PasswordBank in a move aimed at beefing up its enterprise security software roster.
Last week we posted an article on the 25 Information Security Leaders to follow on Twitter [link], unfortunately, as some of our eagle eyed readers pointed out, our list was dominated by men