Security: Page 81
-
Trend Micro: 100 million Android users may be utilizing compromised apps
Researchers say the flaw may be worse than the Android Stagefright library discovered earlier this year.
By Justine Brown • Nov. 2, 2015 -
US, UK to run joint financial cyber-security drill this month
British official: "There will be no testing of cash machines coming down, banks coming down or anything like that."
By Justine Brown • Nov. 2, 2015 -
Federal CIO introduces new cybersecurity strategy
Tony Scott revealed a new plan for improving federal government IT security.
By Justine Brown • Nov. 2, 2015 -
U.S. Commerce secretary says new Safe Harbour agreement eminent
The US and the EU may be close to a new deal for transferring data between the two groups.
By Justine Brown • Oct. 30, 2015 -
Fujitsu may be first to use biometric data as encryption key
The company says it’s using elements extracted from the biometric scan itself as a part of a procedure to encrypt data.
By Justine Brown • Oct. 29, 2015 -
Copyright Office says it's ok for people to alter automobile software
An argument over who should be able to control automobile software is in the limelight following the VW scandal.
By Justine Brown • Oct. 29, 2015 -
Deep Dive
Malvertising threats on the rise, and more sophisticated than ever
IT leaders should be on the lookout for growing ad-ware based risks.
By Justine Brown • Oct. 28, 2015 -
Senate officially passes controversial CISA
As predicted last week, the Senate passed CISA by a wide margin yesterday.
By Justine Brown • Oct. 28, 2015 -
Cisco focusing on analytics, security with new strategic purchases
Cisco made two new purchases this week, allowing it to continue to build its security software and analytics businesses.
By Justine Brown • Oct. 28, 2015 -
Boy, 15, arrested in connection with TalkTalk security hack
Some warn that customers may be able to cancel contracts and avoid paying penalties.
By Deborah Barrington • Oct. 27, 2015 -
UK broadband CEO: Breached data not encrypted
Samples of TalkTalk customer data have appeared on the dark web, appearing to confirm the attack.
By Justine Brown • Oct. 26, 2015 -
U.S. CIO: Get to the cloud "as soon as you can"
Touting security as a top advantage, Tony Scott said government agencies and private businesses alike have much to gain from the cloud.
By Justine Brown • Oct. 23, 2015 -
Senate moves ever closer to passing CISA
A procedural vote of 83-14 yesterday appears to be a strong endorsement of the bill.
By Justine Brown • Oct. 23, 2015 -
Despite growing cyber-attacks, most companies say they are underprepared
Only half of companies surveyed said they had taken steps to prevent attacks.
By Justine Brown • Oct. 22, 2015 -
Malvertising attacks on the rise
Modern malvertising is effective because readers often don’t know it’s happening.
By Justine Brown • Oct. 22, 2015 -
Senate takes up controversial cyber security bill again
The hotly debated bill may be passed by early next week, says Sen. McConnell.
By Justine Brown • Oct. 21, 2015 -
U.S. and EU have three months to develop new Safe Harbour agreement
The two countries don’t have much time to negotiate a new deal for transferring data between them.
By Justine Brown • Oct. 20, 2015 -
CIA director's personal email may have been compromised
A teenager says he accessed email and voicemails, reports CNN.
By Justine Brown • Oct. 20, 2015 -
Deep Dive
California's new law may help raise the digital privacy bar
California just passed a comprehensive law to protect businesses’ digital privacy. Will other states -- and the federal government -- follow suit?
By Justine Brown • Oct. 19, 2015 -
China suspected in new attempted U.S. hacks
Even after an agreement between the two countries was formed, experts say China may be looking to steal U.S. trade secrets.
By Justine Brown • Oct. 19, 2015 -
Proposal would formalize penalties for car hacking
Under proposed legislation, convicted car hackers could face fines of up to $100,000.
By Justine Brown • Oct. 19, 2015 -
Yahoo to eliminate traditional password for mail app
Yahoo Mail users will use a new service and their smartphones to verify their identities.
By Justine Brown • Oct. 16, 2015 -
Cyber insurance costs on the rise following high-profile hacks
A jump in premiums and limits on coverage could leave companies exposed.
By Justine Brown • Oct. 14, 2015 -
Fake LinkedIn profiles used in targeted social engineering campaign
The fake profiles claimed to be recruiters, making the unsolicited requests appear less suspicious.
By Justine Brown • Oct. 13, 2015 -
Gartner: IoT represents unprecedented challenge for IT security experts
As IoT emerges, security professionals will need to move beyond just protecting computer systems.
By Justine Brown • Oct. 13, 2015