POS Malware: A PCI Nightmare
There are many types of POS malware, differing in how they infect systems and the type of data they steal. Two-factor authentication can effectively thwart attackers.
There are many types of POS malware, differing in how they infect systems and the type of data they steal. Two-factor authentication can effectively thwart attackers.
> At the end of February, Duo Security will be exhibiting and speaking at one of the largest information security conferences in the world, the 2014 RSA Conference in San Francisco, California!
Hosted monthly at Duo Security's Ann Arbor office, Duo Tech Talks will cover a variety of topics of strong interest to the local technology community. Speakers will be enlisted both from the local community and subject matter experts from across the country.
Google's Android Bouncer was intended to shore up weaknesses of the Android Market by testing applications within a dynamic analysis environment to determine application security. In this talk, Jon Oberheide of Duo Security and his colleague Charlie Miller discussed their methods of bypassing Bouncer.
Duo Security has been shortlisted for the 2014 Cloud Award for Security Innovation of the Year! Since 2011, the Cloud Awards has been celebrating and promoting cloud innovation and excellence exemplified by consultancies, solutions providers, start-ups and more.
> While healthcare has long been lagging when it comes to standardizing and updating technology industry-wide, the final HIPAA omnibus rule released last year has not only healthcare organizations rushing to meet compliance, but also other health IT vendors that now fall under the scope of the revised rule.
As we ring in the new year, it’s the perfect time to take a look back at Duo Security’s most notable 2013 milestones. The following blogs chronicle one great year leading the information security industry, from finding fixes for major Android vulnerabilities to attending the top hacker conventions, to signing on a major social media giant, and more - we’d like to give three cheers to our awesome year in 2013, and here’s to many more!
After many notable data breaches, a lot of pressure was put on not only Twitter to add stronger authentication to their service, but also on social media management companies like Hootsuite and Buffer.
Learn how you can mitigate credential-stealing malware and protect yourself from all kinds of information security threats.