Security: Page 79
-
More vulnerabilities found pre-installed in popular PC models
Dell, Lenovo and Toshiba have all reported vulnerabilities in the last month.
By Justine Brown • Dec. 8, 2015 -
FTC appoints new chief technologist
Lorrie Cranor says she will focus on consumer privacy and data security.
By Justine Brown • Dec. 7, 2015 -
President asks tech companies to help track terrorists online
A senior administration official said the White House wants tech firms to restrict the use of social media for violent ends.
By Justine Brown • Dec. 7, 2015 -
SMBs worldwide under attack from new threat
The so-called “Black Atlas” has compromised businesses around the world.
By Justine Brown • Dec. 4, 2015 -
China and U.S. agree to new cybercrime guidelines
The talks that took place this week were seen as potentially significant in establishing acceptable norms for cyber espionage.
By Justine Brown • Dec. 4, 2015 -
China says OPM hack was not state-sponsored
The country’s official news agency says the hack of U.S. government data that exposed sensitive personal information of more than 22 million people was criminal in nature.
By Justine Brown • Dec. 3, 2015 -
Deep Dive
Tech giants hard at work to fight increasingly sophisticated cyber criminals
CIOs face a growing threat environment, and tech companies want to make sure they don’t take cyber attacks lying down.
By Justine Brown • Dec. 2, 2015 -
China and U.S. convene cyber security talks
The meetings are seen as potentially significant in establishing acceptable norms for cyber espionage.
By Justine Brown • Dec. 2, 2015 -
Toymaker VTech is latest reported hacking victim
The company says up to five million consumers may have been affected, compromising the information of children.
By Justine Brown • Dec. 1, 2015 -
Court filing: FBI used secretive authority to force Internet, telecom firms to hand over customer data
This is believed to be the first time the government has provided details of its "national security letters."
By Justine Brown • Dec. 1, 2015 -
Lenovo fixes third vulnerability in less than six months
The latest flaw allowed hackers to have administrative rights.
By Justine Brown • Dec. 1, 2015 -
Microsoft offers enterprise customers ability to bounce potentially unwanted applications
The company says system administrators can deploy PUA protection for the specific anti-malware product version in their organization through the registry as a Group Policy setting.
By Justine Brown • Nov. 30, 2015 -
EU and US locked in negotiations over new Safe Harbour agreement
The EU wants further guarantees that U.S. authorities will not access Europeans' data.
By Justine Brown • Nov. 30, 2015 -
Hilton latest hotel chain to be hit with malware
Hotel chains appear to be the latest target of choice for cyber criminals. Starwood reported earlier this week that some of its payment systems had been infected with malware.
By Justine Brown • Nov. 25, 2015 -
Dell says laptops shipped with program that opens backdoor for hackers
A pre-installed program could make the machines susceptible to cyber intrusions.
By Justine Brown • Nov. 24, 2015 -
Microsoft CEO: Combat 'attacks on trust' with collaboration
Bottom line, customers are not going to use technology if they can't trust it, says Satya Nadella.
By Justine Brown • Nov. 24, 2015 -
IG Report: U.S. State Department needs to improve security
The department’s Inspector General says the department could be putting sensitive data at risk.
By Justine Brown • Nov. 23, 2015 -
Starwood Hotels says PoS malware attack under control
The company said several of its North American properties were targeted by malware designed to collect payment information.
By Justine Brown • Nov. 23, 2015 -
Deep Dive
Bigger not always better when it comes to cloud
Forrester recommends CIOs work with major public cloud providers rather than small ones, but the right fit depends on a company’s needs.
By Justine Brown • Nov. 23, 2015 -
Security experts: U.S. government is sponsoring smartphone encryption apps
The government may be leveraging startup software developers building encryption tools in order to find ways the encryption can be broken.
By Justine Brown • Nov. 20, 2015 -
Prosecutor pushes for law that would weaken smartphone encryption
The debate over whether secure encryption is a barrier to U.S. intelligence operations and criminal investigations escalates.
By Justine Brown • Nov. 19, 2015 -
Government agencies want better transparency from cloud providers
FBI CISO says lack of transparency is making government cloud adoption difficult.
By Justine Brown • Nov. 19, 2015 -
Cisco working to improve security perceptions in wake of NSA scandal
The company wants to assure prospective customers that its security is exceptional.
By Justine Brown • Nov. 19, 2015 -
Deep Dive
Insider security threats need CIO attention, too
Outside threats get more attention, but insider threats may actually pose more danger to an organization.
By Justine Brown • Nov. 18, 2015 -
Senator wants to extend NSA program for collecting phone data
Following the attacks in Paris, Senator Tom Cotton says the time is not right to end the program.
By Justine Brown • Nov. 18, 2015