Security: Page 84
-
iPhone hack infiltrates more than 200,000 jailbroken devices
Palo Alto Networks is calling the attack "the largest known Apple account theft caused by malware."
By Justine Brown • Sept. 2, 2015 -
Deep Dive
Dodging disaster: How educating employees can stamp out cybersecurity threats
Increased investment in employee training can reduce the risk of a cyber attack by as much as 70%.
By Justine Brown • Sept. 1, 2015 -
U.S. considers sanctions against China over cyber theft
The possible sanctions send "a signal to Beijing that the administration is going to start fighting back on economic espionage," an official with the administration said.
By Justine Brown • Sept. 1, 2015 -
IDC: CSOs tend to burn out faster than other IT professionals
A culture of antagonism between security needs and what workers want may contribute to retention problems in the chief security officer role.
By Justine Brown • Sept. 1, 2015 -
FTC to hold inaugural PrivacyCon to address data protection
The event will bring together a variety of representatives to discuss the role of data collection in business.
By Justine Brown • Sept. 1, 2015 -
NTIA encouraging researchers, vendors to collaborate on cybersecurity vulnerability disclosure
The U.S. agency will hold a series of meetings to open up conversation about the controversial subject.
By Justine Brown • Aug. 31, 2015 -
Windows 10 patch information could soon be available to enterprises after all
Convincing businesses to use Windows 10 is critical for Microsoft, so the company may be rethinking its approach to patches.
By Justine Brown • Aug. 31, 2015 -
DHS calls on private sector to help improve mobile security
The government agency has asked seven universities and companies to help them develop secure mobile technology for federal groups.
By Justine Brown • Aug. 31, 2015 -
Computer glitch takes major toll on finance industry
The issue prevented mutual and exchange-traded funds from providing investors with the values of their holdings.
By Justine Brown • Aug. 28, 2015 -
CERT warning: Hard-coded admin credentials make routers vulnerable to hacking
Guessable hard-coded passwords enable hackers to gain administrator access to affected devices.
By Justine Brown • Aug. 28, 2015 -
Microsoft: Windows Update for Business won't be completed until 2016
The company announced WUB for Windows 10 nearly four months ago, but has made little mention of it since.
By Justine Brown • Aug. 28, 2015 -
Study: 1% of employees responsible for 75% of cloud-related enterprise security risk
A CloudLock report found companies can reduce exposure just by paying extra attention to risk-prone users.
By Justine Brown • Aug. 27, 2015 -
Report: Phishing scams cost large companies more than $3M per year
Awareness and training are key to reducing losses attributed to phishing, the Ponemon Institute said.
By Justine Brown • Aug. 27, 2015 -
Startup Velostrata claims to solve key issue preventing businesses from adopting cloud services
The company said it will offer hybrid cloud software that lets organizations offload data more securely to public cloud services.
By Justine Brown • Aug. 27, 2015 -
Report: Cybercriminals increasingly focusing on new account creation
NuData found a significant jump in the number of new accounts identified as high-risk or fraudulent in just the last three months.
By Justine Brown • Aug. 26, 2015 -
Cyberattacks drive Rutgers to spend more on IT security
The university cited growing cybersecurity costs as one of the reasons why it raised tuition and fees 2.3% for the 2015-16 school year
By Justine Brown • Aug. 26, 2015 -
Appeals court grants FTC authority to regulate corporate cybersecurity
The agency wants to hold hotel operator Wyndham Worldwide Corp. accountable for data breaches that led to fraudulent charges.
By Justine Brown • Aug. 26, 2015 -
Kaspersky study: Recovery costs for security incidents higher in virtualized environments
Companies need to recognize that virtualization can require different security solutions than traditional environments, the study noted.
By Justine Brown • Aug. 25, 2015 -
Survey: Employees' Apple devices rarely comply with standard enterprise security requirements
Centrify found the devices used at work could benefit from more rigorous security controls.
By Justine Brown • Aug. 25, 2015 -
Will renewed interest in cybersecurity spur DRM's comeback?
Experts report that enterprises are taking a new look at Digital Rights Management, which had previously been plagued by usability issues.
By Justine Brown • Aug. 24, 2015 -
Deep Dive
How CIOs can manage unauthorized IT lurking in the shadows
The presence of unapproved software and apps downloaded within an organization is out of control, according to Cisco. What’s the best way for tech professionals to address it?
By Justine Brown • Aug. 24, 2015 -
Cisco report: Successful exploits of Adobe Flash vulnerabilities skyrocketing
The 2015 Midyear Security Report found more Flash Player vulnerabilities so far in 2015 than the annual totals for any year since 2001.
By Justine Brown • Aug. 20, 2015 -
Report: DOL has 'significant deficiencies' in information security
The Inspector General’s report outlines problems with access control, third-party oversight and configuration management.
By Justine Brown • Aug. 20, 2015 -
China might revise its banking cybersecurity rules
Government officials told U.S. tech companies — including IBM, Microsoft and Cisco Systems — that it will seek opinions on a new version.
By Justine Brown • Aug. 20, 2015 -
Microsoft releases emergency update for IE vulnerability
The company said a flaw allows attackers to execute code with the current user's privileges.
By Justine Brown • Aug. 19, 2015