Discover a new way to find and share stories you'll love… Learn about Reading Desk

Trend Results : "Cybersecurity"

Blog Post Results (1-20 of 2410)


Tips for avoiding online shopping scams

14 hours agoTechnology : Tech Talk

Cybersecurity expert Brian Krebs exposes some of the biggest mistakes people make during the holiday shopping season.

Uber's Android App May Be Collecting An Alarming Amount Of Your Personal Data

Uber's Android app may be sending your private data back to the company, reports Cult of Mac's Buster Hein. The data transfer was reportedly discovered by Joe Giron, who runs a cybersecurity firm. Cult of Mac says: "Digging into the app’s code, GironSec discovered the Uber app “calls home” and sends private data back to Uber. Show More Summary

Essential reading: the irreconcilable tension between cybersecurity and national security

2 days agoOdd : Boing Boing

Citizenlab's Ron Diebert lays out the terrible contradiction of putting spy agencies -- who rely on vulnerabilities in the networks used by their adversaries -- in change of cybersecurity, which is securing those same networks for their own citizens. Read the rest

E-Commerce and Cybersecurity: A Checklist For Online Retailer Startups

How startups and small businesses can check all of the boxes to collect payment and keep data secure online

Sophisticated Malware Regin Linked To NSA, British Intelligence

When cybersecurity firm Symantec uncovered the sophisticated malware Regin over the weekend, its analysts reported that it was most likely created by a national intelligence agency. Now, new reports suggest that the malware was a tool of the U.S. Show More Summary

White House, State Department, and USPS have sub-par cybersecurity

The government may track your digital communications and store all sorts of data about you — but don't expect them to keep it safe. Internal federal reports have revealed that despite repeated threats from hackers at home and abroad, key federal agencies continue to maintain vulnerable web presences and all around lax cybersecurity. Show More Summary

Hack at Sony Pictures shuts computer system

Sony Pictures Entertainment suffered a widespread hack that rendered the film studio's computer systems useless, in a twist right out of a cybersecurity thriller movie.

SEC Risk Factors: How To Determine The Business Value Of Your Data To A Foreign Government

“Consistent with the Regulation S-K Item 503(c) requirements for risk factor disclosures generally, cybersecurity risk disclosure provided must adequately describe the nature of the material risks and specify how each risk affects the registrant. Show More Summary

Here’s why the iPhone ‘Masque Attack’ security flaw is so scary

Earlier this month, researchers at cybersecurity firm FireEye discovered a vulnerability in the iOS operating system which could allow hackers to replace legitimate apps with malicious copies, giving them access to any data the user entered into the hacked app. Show More Summary

Why TV Is Not The Place To Go For Cybersecurity Advice

When disaster strikes, online and digital security is big news. Big data breaches, major security threats to online users and other security related topics result in the “experts” being wheeled out to offer a supposedly professional analysis of the situation. Show More Summary

Can Hackers Get Into Your Pacemaker?

Lapses in cybersecurity leave hospital records and patients' medical devices open to exploitation.

AirHopper: Even Air-Gap Networks are Not Secure

It’s a good time to be in the Cybersecurity business. Quite often, highly secure computers are disconnected from the outside world so as to not get hit by hackers. However, it seems these air-gap networks named for their isolation from other computers are not as secure as we once thought. Show More Summary

Wall Street Buying Some Extra-Strong Barn Doors

Because, you know, they probably should have had them already, and no one wants to have that look that Jamie Dimon had on his face when told about the incident. Financial-services companies plan to bolster their cybersecurity budgets by about $2 billion over the next two years, according to accounting and consulting firm PricewaterhouseCoopers…. Show More Summary

Cybersecurity and the NLRB

By Jon Hyman, Workforce A few months ago, I wrote how the National Labor Relations Board was exploring new areas of potential protected concerted activity to regulate. One such area is information and data security.

New Book Reveals Significant Cybersecurity Information Sharing Between Tech Companies And NSA; So Why Do We Need A New Law?

last weekIndustries / Law : Techdirt

Salon has published an excerpt from Shane Harris' new book (which looks excellent), @War: The Rise of the Military-Internet Complex. The specific excerpt is called: Google's secret NSA alliance: The terrifying deals between Silicon Valley and the security state, and it's an absolute must read. Show More Summary

VA fails cybersecurity audit for 16th consecutive year

The Department of Veterans Affairs failed its annual cybersecurity audit this year, marking the 16th consecutive time that the agency did not pass muster with the review, according to its top technology officer. VA Chief Information Officer Stephen Warren told reporters about the problem  in advance of a Tuesday hearing with the House Veterans Affairs Committee, according to […]

C3 Chairman Discussion Cybersecurity

In his keynote address at the recent Trustworthy Cyber Infrastructure for the Power Grid (TCIPG) annual industry workshop, C3 Energy chairman and chief executive officer Tom Siebel discussed the need to provide utilities advanced diagnostics and predictive tools to identify, monitor, and reduce the risks of grid cybersecurity threats. via C3 Chairman Discussion Cybersecurity -.

24% of Facebook ads are for counterfeit goods, study finds

Think twice before buying those shiny — yet extremely cheap — Ray Ban glasses advertised on Facebook. There's a good chance they're fake At least, that's the conclusion of a new study by two cybersecurity researchers who studied more...Show More Summary

Why did China allegedly steal Israel's missile defense plans?

A cybersecurity firm reports that Chinese hackers have stolen technical data for the Iron Dome rocket-defense system from Israeli computers. Maryland-based Cyber Engineering Services detected the cyber burglary, according to cybersecurity writer Brian Krebs. Show More Summary

Copyright © 2011 Regator, LLC