Security: Page 46


  • WannaPayment: Bitcoin accounts from WannaCry attack emptied

    It is unknown who cleared the accounts. Even though Bitcoin transactions and accounts are public, ownership remains anonymous.

    By Naomi Eide • Aug. 7, 2017
  • Spoiler alert: HBO suffers data breach, extent of hack still unknown

    First reported by Entertainment Weekly Monday, hackers claimed they took 1.5 terabytes of data from HBO, including written material from "Game of Thrones."

    By Naomi Eide • Aug. 4, 2017
  • GAO: OPM making headway on security improvements, but more work required

    Following a 2015 data breach, OPM is trying to update its security with guidance from the GAO.

    By Samantha Schwartz • Aug. 4, 2017
  • Symantec offloads website security, certificate business for $950M

    Though Symantec says the sale allows it to focus more on enterprise security, the deal rids the company of its troubled web certificate business.

    By Naomi Eide • Aug. 3, 2017
  • Senators propose bipartisan law to secure IoT. But how?

    The measure would place the onus on manufacturers to adequately secure internet-connected devices.

    By Naomi Eide • Aug. 2, 2017
  • Netflix highlights risk of DDoS attacks, but at the application layer

    In a Chaos Kong experiment, Netflix launched a mock rare attack that could take down an entire microservice architecture. 

    By Samantha Schwartz • Aug. 1, 2017
  • Anthem breached again after contractor emailed file with 18,500 members' info

    The contractor was an employee of LaunchPoint Ventures, a third-party vendor which provides insurance coordination services to the payer.

    By Naomi Eide • Aug. 1, 2017
  • Fake CEO emails dupe companies out of billions

    In the past three years, these emails have cost employers $5.3 billion — much more than ransomware attacks.

    By Valerie Bolden-Barrett • July 31, 2017
  • Deep Dive

    Technobabble: All the places we can go with microchips and brain/computer interfaces

    Hypochondriacs and conspiracy theorists must be having an adverse reaction today.

    By Samantha Schwartz • July 28, 2017
  • Is the GSA reviving plans for civilian cybersecurity campus in DC?

    The idea for the CCC has been on the table for a while, but nailing down the timing — and the funding — has been a challenge.

    By Hallie Busta • July 28, 2017
  • Image attribution tooltip
    Getty
    Image attribution tooltip

    McAfee report highlights importance of using human-machine teams

    The report also found that the most successful cybersecurity teams automate threat investigation and allocate about 50% more time to threat hunting. 

    By July 27, 2017
  • AMD backs off cryptocurrency even as demand grows

    CEO Lisa Su says the company will not include cryptocurrency in its forecast.

    By July 27, 2017
  • SEC warns ICO users they must play by same rules as traditional securities

    There is currently no regulatory oversight for Initial Coin Offerings.

    By July 27, 2017
  • The end of the road: Adobe to phase out Flash Player by 2020

    Content creators are being advised by Adobe to begin moving existing Flash content to open formats.  

    By July 26, 2017
  • Microsoft introduces tool to make Blockchain services more usable

    Blockchain has potential for a wide range of uses in the enterprise, though it can be challenging for companies to figure out what to do with it and how to use it. 

    By July 26, 2017
  • IBM launches IoT security testing service

    The Watson-enabled security service was announced but how are organizations using it?

    By July 25, 2017
  • Mac threat revealed earlier this year may be worse than first reported

    The malware enables hackers to access a computer's files, screens and webcams.

    By July 25, 2017
  • Deep Dive

    4 innovative uses of blockchain in the enterprise

    Experts say there's huge potential for blockchain in the enterprise, but how are organizations using it?

    By July 24, 2017
  • Tor Project to launch public bug bounty project

    The Tor Project wants to find vulnerabilities that could compromise the anti-surveillance network.

    By July 21, 2017
  • BlackBerry pushes deeper into federal security space

    The company was approved to sell its Secusuite tool for encrypting phone calls and text messages to federal government agencies.

    By July 21, 2017
  • Image attribution tooltip
    Elizabeth Regan for CIO Dive
    Image attribution tooltip
    Deep Dive

    In an era of global malware attacks, what happens if there's no kill switch?

    Unlike May's WannaCry attack, most cyberattacks do not come with a kill switch. To avoid panic, make preemptive actions and not reactionary ones.

    By Samantha Schwartz • July 20, 2017
  • Attacks on iOS devices outpacing attacks on Android for first time

    Mobile phones often operate outside of the range of a virtual corporate network and are fully controlled by employees, making them much more difficult to protect.

    By July 19, 2017
  • Google implements 'unverified app' amidst phishing worm

    The phishing attack used an invitation to edit a Google Doc to access a Google Drive user's contact list to continue its wormability. 

    By Samantha Schwartz • July 19, 2017
  • Image attribution tooltip
    Dollar Photo Club
    Image attribution tooltip

    Cost of education data breaches averages $245 per record

    That's much higher than the worldwide cost of around $200 per record, according to a study from the Ponemon Institute. 

    By Shalina Chatlani • July 19, 2017
  • Why do former employees still have access to company networks?

    Chalk it up to a lack of awareness, as 44% of OneLogin survey participants said they did not know whether former employees' accounts have been deactivated.

    By Samantha Schwartz • July 18, 2017