Security: Page 68
-
Tech companies push Senate to pass email privacy bill without change
Apple, IBM, Cisco, Amazon and Google are among the companies pressing senators to not weaken the legislation.
By Justine Brown • May 25, 2016 -
Passwords persist, but users call for advanced authentication
While consumers are calling for better login methods, they still exhibit poor password hygiene and usually fail to create a unique login for each online account, a recent survey found.
By Justine Brown • May 25, 2016 -
To improve House's security culture, lawmakers push encryption use
The two representatives want their colleagues to use end-to-end encryption, even as some lawmakers are fighting the increased security measures.
By Justine Brown • May 23, 2016 -
Google working to replace Android passwords with biometrics
Several large financial institutions will start testing the technology, known as the "Trust API," in June. If all goes well, Android developers will have access to the tech by the end of the year.
By Justine Brown • May 23, 2016 -
Senators push bill to attack 'zombie' cybercriminals
The bipartisan group of senators wants to give law enforcement agencies and courts expanded authority to crack down on botnets.
By Justine Brown • May 23, 2016 -
SWIFT messaging network urges banks to share cyberattack data
The request came after three banks failed to tell the global financial messaging network about a 2015 attack that resulted in the theft of $12 million.
By Justine Brown • May 23, 2016 -
Majority of enterprise Android phone users have not deployed critical QSEE security patch
A research group estimates 80% of enterprise phones use the Qualcomm chipset, which the security exploit targets.
By Justine Brown • May 20, 2016 -
Federal cyber execs doubt impact of government's cybersecurity improvement efforts
The majority of survey respondents from across defense, intelligence and civilian agencies said they don’t think improvement efforts to date have made much difference.
By Justine Brown • May 19, 2016 -
Deep Dive
BYOD vs. enterprise security: Is it possible to have both?
Weighing the advantages of a BYOD policy against the potential security risks can prove challenging for an enterprise's IT strategy.
By Justine Brown • May 19, 2016 -
Report: Federal agencies show some improvement on cybersecurity
The latest scorecard from the House Oversight Committee showed incremental improvements at seven agencies.
By Justine Brown • May 18, 2016 -
Report: Homeland Security employees pass phishing scams, struggle with physical security
Tests at the Department of Homeland Security and the Office of Personnel Management show federal employees are increasingly wise to phishing attempts.
By Justine Brown • May 18, 2016 -
From recruiting to in-house training, cybercriminals using traditional business tactics
A new white paper from Hewlett Packard Enterprise found further evidence that today’s hackers are no longer "lone wolves."
By Justine Brown • May 18, 2016 -
Deep Dive
'Plain gross negligence': One security researcher's crusade to find unsecured systems
In a conversation with CIO Dive, security researcher Chris Vickery discusses his work finding publicly accessible, unsecured databases and the role of human error in security.
By Naomi Eide • May 17, 2016 -
Study: Users' online behavior changing over security concerns
Following high profile data breaches, people are using the Internet less frequently for secure transactions, according to a new report.
By Justine Brown • May 16, 2016 -
Researchers link malware from Bangladesh Bank heist, Sony Pictures attack
A new report from BAE Systems found the malware from the Bangladesh Bank hack had "the same unique characteristics" as software used in the 2014 Sony breach.
By Justine Brown • May 16, 2016 -
Federal tech team accused of 'data breach' for connecting Slack, Google Drive
An inspector general report found the General Services Administration's digital services team, 18F, connected Slack with Google Drive, "potentially exposing sensitive content."
By Justine Brown • May 16, 2016 -
Deep Dive
'Change is hard': 4 takeaways from the CA Technologies Government Summit
This week, the software company hosted their government summit, with panels discussing topics like IT budget constraints and the challenges of the modern threat landscape.
By Naomi Eide • May 13, 2016 -
Second malware attack targets commercial bank, worldwide financial network says
SWIFT, the financial messaging platform used by 11,000 banks around the world, was also targeted by malware in the $81 million cyber heist on Bangladesh Bank earlier this year.
By Justine Brown • May 12, 2016 -
Spear-phishing campaign exploiting Windows zero-day vulnerability hits retail, hospitality industries
Over 100 companies were hit with phishing campaign designed to steal customer credit card data, FireEye researches said.
By Justine Brown • May 12, 2016 -
To boost interest in cybersecurity, Facebook makes hacking game open source
The social network hopes that by opening up its hacking game, more people will become interested in cybersecurity, including the next generation of tech professionals.
By Justine Brown • May 12, 2016 -
7 departing FDIC employees took 160,000 US residents' personal bank account info with them
FDIC CIO Lawrence Gross Jr. told a congressional oversight subcommittee Thursday that he believed the data breaches were "inadvertent."
By Justine Brown • May 12, 2016 -
Report: Data breach threats loom over financial services firms
Nearly one in five financial services respondents indicated they had suffered a data breach in the last year.
By Justine Brown • May 12, 2016 -
House bans Yahoo Mail, Google-hosted apps following uptick in ransomware attacks
A spokesperson declined to confirm whether or not any of the recent ransomware attacks were successful. The House of Representatives IT department said it is continuing the ban "until further notice."
By Justine Brown • May 12, 2016 -
Homeland Security issues warning over SAP bug the company patched six years ago
The security warning from the U.S. Department of Homeland Security's Computer Emergency Response Team underscores the importance of enterprise follow-through in patching software vulnerabilities.
By Justine Brown • May 12, 2016 -
Report: Computers, phones often lack basic security hygiene
Duo Labs examined two million devices, all of them running Duo's two-factor authentication application, and found that the devices often had out of date applications.
By Justine Brown • May 11, 2016