Hackers continue to find vulnerable targets, but it's not just retailers.
Ransomware encrypts your files and then asks you to send the money to a Breaking Bad-inspired email address.
Industry VoiceWhen securing sensitive data and information for cloud storage or file transfer, one of the biggest mistakes is simply not following best practices.
Good leverages ARM's TrustZone to bring Trusted Execution Environment as hardware-based authentication to Android phones.
Hardware-based security is the trending theme of RSA 2015, and Microsoft shows how that can be achieved on Windows 10 with Device Guard.