Cybersecurity expert Brian Krebs exposes some of the biggest mistakes people make during the holiday shopping season.
Uber's Android app may be sending your private data back to the company, reports Cult of Mac's Buster Hein. The data transfer was reportedly discovered by Joe Giron, who runs a cybersecurity firm. Cult of Mac says: "Digging into the app’s code, GironSec discovered the Uber app “calls home” and sends private data back to Uber. Show More Summary
Citizenlab's Ron Diebert lays out the terrible contradiction of putting spy agencies -- who rely on vulnerabilities in the networks used by their adversaries -- in change of cybersecurity, which is securing those same networks for their own citizens. Read the rest
How startups and small businesses can check all of the boxes to collect payment and keep data secure online
When cybersecurity firm Symantec uncovered the sophisticated malware Regin over the weekend, its analysts reported that it was most likely created by a national intelligence agency. Now, new reports suggest that the malware was a tool of the U.S. Show More Summary
The government may track your digital communications and store all sorts of data about you — but don't expect them to keep it safe. Internal federal reports have revealed that despite repeated threats from hackers at home and abroad, key federal agencies continue to maintain vulnerable web presences and all around lax cybersecurity. Show More Summary
Sony Pictures Entertainment suffered a widespread hack that rendered the film studio's computer systems useless, in a twist right out of a cybersecurity thriller movie.
“Consistent with the Regulation S-K Item 503(c) requirements for risk factor disclosures generally, cybersecurity risk disclosure provided must adequately describe the nature of the material risks and specify how each risk affects the registrant. Show More Summary
Earlier this month, researchers at cybersecurity firm FireEye discovered a vulnerability in the iOS operating system which could allow hackers to replace legitimate apps with malicious copies, giving them access to any data the user entered into the hacked app. Show More Summary
When disaster strikes, online and digital security is big news. Big data breaches, major security threats to online users and other security related topics result in the “experts” being wheeled out to offer a supposedly professional analysis of the situation. Show More Summary
Lapses in cybersecurity leave hospital records and patients' medical devices open to exploitation.
It’s a good time to be in the Cybersecurity business. Quite often, highly secure computers are disconnected from the outside world so as to not get hit by hackers. However, it seems these air-gap networks named for their isolation from other computers are not as secure as we once thought. Show More Summary
Because, you know, they probably should have had them already, and no one wants to have that look that Jamie Dimon had on his face when told about the incident. Financial-services companies plan to bolster their cybersecurity budgets by about $2 billion over the next two years, according to accounting and consulting firm PricewaterhouseCoopers…. Show More Summary
By Jon Hyman, Workforce A few months ago, I wrote how the National Labor Relations Board was exploring new areas of potential protected concerted activity to regulate. One such area is information and data security.
Salon has published an excerpt from Shane Harris' new book (which looks excellent), @War: The Rise of the Military-Internet Complex. The specific excerpt is called: Google's secret NSA alliance: The terrifying deals between Silicon Valley and the security state, and it's an absolute must read. Show More Summary
The Department of Veterans Affairs failed its annual cybersecurity audit this year, marking the 16th consecutive time that the agency did not pass muster with the review, according to its top technology officer. VA Chief Information Officer Stephen Warren told reporters about the problem in advance of a Tuesday hearing with the House Veterans Affairs Committee, according to […]
In his keynote address at the recent Trustworthy Cyber Infrastructure for the Power Grid (TCIPG) annual industry workshop, C3 Energy chairman and chief executive officer Tom Siebel discussed the need to provide utilities advanced diagnostics and predictive tools to identify, monitor, and reduce the risks of grid cybersecurity threats. via C3 Chairman Discussion Cybersecurity -.
Think twice before buying those shiny — yet extremely cheap — Ray Ban glasses advertised on Facebook. There's a good chance they're fake At least, that's the conclusion of a new study by two cybersecurity researchers who studied more...Show More Summary
A cybersecurity firm reports that Chinese hackers have stolen technical data for the Iron Dome rocket-defense system from Israeli computers. Maryland-based Cyber Engineering Services detected the cyber burglary, according to cybersecurity writer Brian Krebs. Show More Summary