Security vulnerabilities in the direct file transfer applications of popular smartphone makers allow attackers to send malicious files to mobile devices, a security researcher has found. In a...
UPDATED Network security appliance firm F5 has warned of a series of vulnerabilities affecting its BIG-IP products, including a cross-site scripting (XSS) vulnerability that’s said to pose a critical...
Looking ahead to 2021, the pandemic will continue to drive business interactions with consumers online. Customer identity and access management (CIAM) products should see explosive growth...
Report also found that the catch rate for selfie fraud was five times greater than for ID fraud, highlighting the growing importance of capturing a selfie...
Positive Technologies has published its “5G standalone core security assessment”. The report discusses vulnerabilities and threats for subscribers and mobile network operators, which stem from the use of...
Today’s customers rarely bat an eye when they receive a security alert from a company with which they do business. That’s because large tech companies have baked identity...
Though many healthcare organizations still consider it optional, two-factor authentication – also known as Multi-Factor Authentication (MFA) – is an indispensable part of a secure environment,...
Digital Shadows released research on the most popular items for sale on the dark web this holiday season – this one is shaping up to be different than any...
The coronavirus pandemic has sparked a new round of digital transformation. But in many cases, the rapid pace of digital acceleration has enlarged the digital footprint...
The bottom line is that none of the 23 agencies audited fully implemented foundational risk management practices. Days after news that sophisticated hackers exploited a flaw...