Skip to content
Twitter page opens in new windowLinkedin page opens in new window
  • Contact Us
top-bar
Security Current
Security Current improves the way security, privacy and risk executives around the world collaborate to protect their organizations and their information. Its CISO-driven proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.
Security Current

  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles
Search:
  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles

Archived Articles

Samsung Galaxy S4 Allegedly Vulnerable to Attack

Aimee Rhodes

Founder and Editor-in-Chief

Security Current

Archived ArticlesBy Aimee RhodesDecember 26, 2013Leave a comment

Organizations and government agencies that use Samsung’s flagship Galaxy S4 smartphone are at risk of having their confidential data including emails, file transfers and browser activity breached, according to cyber…

Details

Update – Nefarious Pseudo Random Number Generator Never Actually Used in SSL

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonDecember 22, 2013Leave a comment

(Updates with RSA denial) There has been a lot of furor over the Random Number Generator that the NSA, with a rather heavy hand, apparently forced NIST to accept into its…

Details

Thermal Imaging Attacks; Research Heats Up!

Paul Robertson

Director, Cyber Security

Archived ArticlesBy Paul RobertsonDecember 19, 2013Leave a comment

We’ve all had or seen server room doors protected by combination locks. Most safes these days are protected by electronic keypads, like the ones used to safeguard on-site backup tapes. Using…

Details

Working Group to Develop Security Standards for Mobile Apps

Gail Bronson

Guest Contributor

Archived ArticlesBy Gail BronsonDecember 18, 2013Leave a comment

The establishment of the Mobile App Security Working Group, (MAS), was announced at the Amphion Forum in San Francisco last week. Member companies will collaborate to develop security standards for…

Details

Payment Card Manufacturer Datacard Group to Acquire Digital Certificate Pioneer Entrust

Richard Stiennon

Chief Research Analyst

IT-Harvest

Archived ArticlesBy Richard StiennonDecember 17, 2013Leave a comment

Datacard Group today announced that they are acquiring Entrust a digital certificate and identity services provider. Financial details were withheld by both private entities, the companies said in a release. Entrust will be…

Details

Enterprises in APAC Increasingly Adopt Managed Security Services

Aimee Rhodes

Founder and Editor-in-Chief

Security Current

Archived ArticlesBy Aimee RhodesDecember 16, 2013Leave a comment

Managed Security Services (MSS) in Asia-Pacific (APAC) region will more than triple by 2019, climbing to an estimated $5.34 billion according to industry analyst firm Frost & Sullivan. Enterprises in…

Details

Federal Judge Rules Against NSA Phone Data Mining, Likely Violates Constitution

Aimee Rhodes

Founder and Editor-in-Chief

Security Current

Archived ArticlesBy Aimee RhodesDecember 16, 2013Leave a comment

A Federal District Court judge today ruled that the National Security Agency (NSA) program that once-secretly collected records of all Americans’ phone calls likely violates the Constitution and called the program’s…

Details

Spy On Me, I’d Rather Be Safe

Gail Bronson

Guest Contributor

Archived ArticlesBy Gail BronsonDecember 11, 2013Leave a comment

Thanks to the hijinks of Edward Snowden, and just this week, the news that a group of eight tech giants, including Google and Microsoft, are asking for governments worldwide to…

Details

Researchers Find Off-the-Shelf Parrot AR Drones Susceptible to Hacking

Aimee Rhodes

Founder and Editor-in-Chief

Security Current

Archived ArticlesBy Aimee RhodesDecember 6, 2013Leave a comment

Security researchers have discovered a weakness in off-the-shelf aerial drones that could potentially carry nefarious payloads, which could allow law enforcement officials to take control of the unmanned crafts in mid…

Details

Two Million Passwords Stolen Worldwide from Popular Websites

Gail Bronson

Guest Contributor

Archived ArticlesBy Gail BronsonDecember 4, 2013Leave a comment

Cyber security researchers discovered that about two million credentials were stolen from end users frequenting popular websites earlier this year, making it easier for hackers to use their credentials to send…

Details
←1
2345678910111213141516171819202122232425
…2627282930…
3132
33→
Security Current
© Security Current 2023
Go to Top
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}