Botnet-powered credential stuffing still a problem: Report

Phishing is one of the most successful ways attackers get past an organization's network defences. But credential stuffing --backed by...

September 25th, 2018 Howard Solomon

Controversy over report that company can unlock most iPhones

Owners of Apple iPhones are wondering how safe their password-locked handsets are from attack with news that an Israeli-based forensics...

February 27th, 2018 Howard Solomon

10 practical privacy resolutions you can make for the New Year

The day after New Year's was always my favorite growing up, and not because my birthday is January 2nd (worst...

December 20th, 2017 Arianne Martin

Why mid-sized firms are at increased risk for security attacks

Mid-size organizations face most of the same security risks as their larger competitors, but recent studies show they are targeted...

Sponsored By: Fortinet

Password Prompt

Searchable database of 1.4 billion stolen credentials found on dark web

A security vendor has discovered a huge list of easily searchable stolen credentials in cleartext on the dark web which...

December 11th, 2017 Howard Solomon

Secure mobile healthcare? There’s an app for that

Security is a critical issue in developing mobile healthcare applications, but experts say it can be solved without compromising user...

December 1st, 2017 Cindy Baker

Password Prompt

Phishing kits best way for attackers to get credentials, says study

There are billions of stolen credentials available for purchase on the black market dating back perhaps 20 years. Their value...

November 10th, 2017 Howard Solomon


Password Prompt

Warning issued for password control over system accounts

Some vulnerabilities are buried deep in code. Other times a vulnerability is right under the noses of infosec pros. One...

October 16th, 2017 Howard Solomon