Security: Page 70
-
Deep Dive
Cryptoworms are coming, but is your company ready?
The latest trend in the security threat landscape could be self-propagating ransomware.
By Justine Brown • April 26, 2016 -
Investigators: Bangladesh Bank heist included SWIFT system hack
Security weaknesses reportedly enabled attackers to modify a SWIFT software program installed on bank servers.
By Justine Brown • April 26, 2016 -
Defense Department wants its own encrypted messaging platform
The DoD wants to create a new messaging app based on blockchain technology, which would make communications more secure.
By Justine Brown • April 26, 2016 -
Spotify user data appears online, but company vows no new hack occurred
The company said it has not been hacked and that its user records are secure, which has led some to conclude that the available account details are from a previous data breach.
By Justine Brown • April 26, 2016 -
Bug hunter finds backdoor in Facebook's servers left behind by hackers
But a member of the company's security team was quick to downplay the vulnerability on the third-party software and said hackers were unable to use the backdoor to breach other parts of Facebook's infrastructure.
By Justine Brown • April 25, 2016 -
Personal information of every voter in Mexico left unsecured
The data was available on an Amazon Web Services server that was not password protected, but the company says on its website that security in the cloud is up to the customers, while it manages security of the cloud.
By Justine Brown • April 25, 2016 -
MIT premieres bug bounty program
One of the first at a major U.S. university, the "experimental" bug bounty program will reward accredited affiliates who locate vulnerabilities on MIT’s internal domains.
By Justine Brown • April 25, 2016 -
SecureWorks launches first tech IPO of 2016, but results disappoint
The cybersecurity company raised $112 million, significantly less the $181 million it had originally hoped for.
By Justine Brown • April 25, 2016 -
Report: Bangladesh Bank subject to cyber heist had cheap, dated security
An investigator discovered the bank had no firewall and used second-hand switches to network computers.
By Justine Brown • April 21, 2016 -
NASA's defenses weakened from revolving door of security leadership, inspector general says
Over the past year and a half, NASA has had three "acting" senior security officers in the CIO's department.
By Justine Brown • April 21, 2016 -
Tech companies rally to fight 'unworkable' encryption bill
Companies like Apple, Facebook and Google, along with privacy proponents, say the proposed legislation would weaken defenses rather than strengthen them.
By Justine Brown • April 21, 2016 -
Google temporarily finds Google.com 'partially dangerous'
The company’s Safe Browsing program warns users about its own website.
By Justine Brown • April 21, 2016 -
Apple, FBI again fight over encryption at Congressional hearing
Congress is examining the issue again in light of recent draft encryption legislation.
By Justine Brown • April 20, 2016 -
Why a federal jury ordered Tata Consultancy to pay Epic Systems $940M
The case highlights challenges in controlling permissions when companies use third-party contractors.
By Justine Brown • April 20, 2016 -
Amazon rolls out tool for automated cloud security
Despite huge growth in the adoption of cloud technology, security remains a primary concern for enterprises.
By Justine Brown • April 20, 2016 -
Federal agencies still struggle to close cybersecurity skills gap
The Office of Personnel Management said experts and chief human capital officers will collaborate to develop a government-wide strategy for improvement.
By Justine Brown • April 20, 2016 -
Despite previous comments, Homeland Security supports federal open source policy
The department previously slammed a draft White House policy that would encourage 20% sharing of custom code between agencies.
By Justine Brown • April 19, 2016 -
Security loophole in cell phone system could give hackers access to calls, texts, locations
The FCC reportedly has done little to address the issue since it was first identified two years ago.
By Justine Brown • April 19, 2016 -
With human input, MIT's AI system can predict 85% of cyberattacks
Combining three different machine learning algorithms enabled AI2 to generate five times fewer false positives than previously developed cyberattack AIs.
By Justine Brown • April 19, 2016 -
Remember the guy who deleted his company? That was a hoax
But the hoaxster claims he knew someone who once did that.
By Randy Lilleston • April 18, 2016 -
Massive security scan uncovers over 3 million vulnerable computers, 2,100 ransomware backdoors
Some of the machines had more than one installation of crypto backdoors in place.
By Naomi Eide • April 18, 2016 -
New EU data privacy law will go into effect in 2018
Companies have two years to comply with a new set of data privacy regulations in Europe and face steep fines if they do not comply.
By Justine Brown • April 15, 2016 -
Report: Government agencies behind all industries in cybersecurity
Federal agencies have especially poor scores for their network security, malware and flaws in software patching, a new report found.
By Justine Brown • April 15, 2016 -
Obama appoints tech execs, former NSA director to new cybersecurity panel
Executives from Uber, Microsoft and MasterCard are among those named to new panel.
By Justine Brown • April 15, 2016 -
Deep Dive
Why there is a cybersecurity gender gap—and how to close it
In interviews with CIO Dive, two female cybersecurity leaders shared their thoughts on why there aren’t more women in the field and how CIOs can help change the situation.
By Justine Brown • April 14, 2016