From traditional credit cards to next-gen payment processing technologies such as EMV cards and mobile wallets, here's a look at how they work, as well as their advantages and disadvantages.
A decade's worth of breaches has led to this. Forward-looking threat researcher Numaan Huq analyzes what has happened to the stolen data affecting major US industries. We map out the probabilities; see where the information goes and how much it's sold.
Malware managed to sneak into Apple's official App Store after devs used a spiked version of Xcode, Apple's official app development tool, downloaded from third party sites.
A new malware called Key Raider has been found stealing Apple account credentials from iOS devices. The good news is that it only affects jailbroken iPhones. Is jailbreaking still worth it?
Online banking is not without risks. As much as it offers ease and convenience, when it comes to security, fraudsters and cybercriminals are very much on the lookout for unknowing users they can steal from.
Major software and OS vulnerabilities and the prevalence of adware and potentially unwanted apps make up the most notable stories of the mobile threat landscape over the first half of 2015.
What is the RCSAndroid spying tool capable of? Who is affected? Which devices are vulnerable? Here are some quick facts you need to know about the Hacking Team’s leaked mobile malware suite:
Attackers are finding more security gaps to abuse, whether they're in existing public-facing technologies or in new developments in the Internet of Things.