The disappearance of Malaysia Airlines Flight 370 highlights the need for security improvements both in tracking aircraft and screening passengers before they board planes, according to the International Air Transport Association.
McAfee Labs collected 2.47 million new mobile malware samples in 2013, with 744,000 in the last quarter alone.
April 1, 2014
The mobile malware “zoo” totaled 3.73 million samples at the end of the year. According to McAfee Labs Threats Report, Fourth Quarter 2013, malware can arrive on a mobile device through just about every attack vector, such as downloaded apps, malicious website, spam, malicious SMS messages, and malware-bearing advertisements.
What could this mean for the banking and finance industry?
April 1, 2014
A recent study shows that 95 percent of American bank ATMs still run on Windows XP, but Windows is discontinuing support (including security updates) of the XP operating system as of April 8, 2014.
From the five-year period of 2008-2012, there were 373 total spree shooting fatalities.
April 1, 2014
Between January 1, 2009, and December 31, 2013, there were 413 fatalities from mass shootings in the 34 member states of the Organization for Economic Cooperation and Development (OECD).
Jon Huntsman, Jr., governor of Utah (2005-2009) and a candidate for the 2012 Republican Presidential nomination, will be a keynote speaker at the ASIS International 60th Annual Seminar and Exhibits (ASIS 2014) on Tuesday, Sept. 30, 2014 at the Georgia World Congress Center, in Atlanta, Ga.
Chinese authorities have seized assets worth at least 90 billion yuan ($14.5 billion) from family members and associates of retired domestic security tsar Zhou Yongkang.
Tesla Motors' electric vehicles can be located and unlocked by criminals remotely simply by cracking a six-character password using traditional hacking techniques.
Authorities said Thursday that they suspect at least 14 baggage handlers at Los Angeles International Airport of stealing thousands of dollars in electronics, jewelry and other high-priced items from bags and other property at the airport.
Researchers at the University of North Carolina – Wilmington are helping law enforcement groups find real-world uses for facial recognition technology. One specific example is “MIDO” or “Multiple Image Dataset Organizer,” which researchers believe could have helped law enforcement compile that mass amount of information and images that flooded in after the Boston Marathon bombings. After the data is compiled, facial recognition technology could takes effect.