Introduction In this interview, Patty Hatter shares with Gartner Vice President Michael Leckie the story of how she lead the charge on a series of high-value, enterprise-wide initiatives to enable new business capabilities that haveShow More Summary
Let’s stop talking about “breach prevention," and move the public discourse toward breach preparation and understanding, data governance and smart data privacy practices. We need these discussions like never before. The post The Latest Hack Lesson? Great Defense Is Never Enough appeared first on WIRED.
A researcher has unveiled a proof-of-concept demonstrating how easily an unpatched vulnerability can be exploited to steal iCloud account passwords.
The group of cybercriminals are accused of targeting corporations to intercept payment requests and make off with the funds.
If you submit a Mozilla Firefox security flaw in the future, you can expect a "dramatic" payment increase.
Here comes the hammer... Film ghostbusters Paul Feig Bridesmaids Annie Potts Chris Hemsworth
And the verdict is... Film Jurassic Park Jurassic World Chris Pratt
Over the past couple of months McAfee Labs has seen an increase in the usage of macros to deliver malware. This kind of malware, as mentioned in previous posts (Dridex, Bartallex), usually arrives as an attached document within a phishing email. Show More Summary
Ad-blockers can protect a user's privacy by preventing browser tracking.
On September 18, 2013 Greenpeace protestors left the Arctic Sunrise on inflatable motor boats and headed towards Gazprom's oil platform, the Prirazlomnaya, to protest drillings' which threaten the pristine Arctic environment. The Russian Coast Guard was informed of the attempted protest action and sent commandos to intercept them. Show More Summary
Kaspersky says the attackers became entrenched in its networks some time last year. The post Kaspersky Finds New Nation-State Attack—In Its Own Network appeared first on WIRED.
The Pentagon confronts an emerging innovation gap. The only way to catch up is by accessing innovation that is much more likely to come from Silicon Valley than Washington. The post Sen. McCain: How to Get Silicon Valley to Help the Pentagon appeared first on WIRED.
The registry-based threat avoids creating PC files and exploits zero-day threats to hijack compromised computers.
RAND today released the results of its multiphased study on cybersecurity's future, The Defender's Dilemma, delivering a frightening snapshot of defenders lost at sea.
Adobe's latest security update includes fixes for memory leak, memory corruption and remote code execution issues.
"Foreign customers are shunning US companies," says a new independent report.
About one-third of all federal websites offer HTTPS, but the White House said that's not enough.
Do you believe large corporations are the most well-prepared for cyberattacks? New research might make you think twice.
As our medical devices become connected, new hacking threats emerge -- and some of them are potentially life-threatening.
The US Army website was defaced as a result of the SEA's latest political hacking campaign.