POS Malware: A PCI Nightmare
There are many types of POS malware, differing in how they infect systems and the type of data they steal. Two-factor authentication can effectively thwart attackers.
The latest information security news - what's happening now, what's important, why it matters, real-world implications and who it matters to - without any of the overhype.
703 Articles Found
There are many types of POS malware, differing in how they infect systems and the type of data they steal. Two-factor authentication can effectively thwart attackers.
> While healthcare has long been lagging when it comes to standardizing and updating technology industry-wide, the final HIPAA omnibus rule released last year has not only healthcare organizations rushing to meet compliance, but also other health IT vendors that now fall under the scope of the revised rule.
As we ring in the new year, it’s the perfect time to take a look back at Duo Security’s most notable 2013 milestones. The following blogs chronicle one great year leading the information security industry, from finding fixes for major Android vulnerabilities to attending the top hacker conventions, to signing on a major social media giant, and more - we’d like to give three cheers to our awesome year in 2013, and here’s to many more!
After many notable data breaches, a lot of pressure was put on not only Twitter to add stronger authentication to their service, but also on social media management companies like Hootsuite and Buffer.
Learn how you can mitigate credential-stealing malware and protect yourself from all kinds of information security threats.