Senators to push privacy, security legislation for IoT
Some Democratic senators want new laws that mandate security and privacy measures on the Internet of Things, as concern grows over personal data collected by connected devices.Several democratic...
View ArticleFAQ: How to find and remove Superfish from your Lenovo laptop
Lenovo has shipped consumer PCs with software designed to offer a visual shopping experience, but in reality it's adware that breaks HTTPS online – leaving customers vulnerable to attack and...
View ArticleCrooks targeting call centers to further Apple Pay fraud
According to mobile payments expert Cherian Abraham, fraud on Apple's mobile payment platform – Apple Pay – is rampant. However, Apple's hardware and software security measures remain intact; the...
View ArticleGeofencing could add security layer for mobile devices
Geofencing technology -- tracking the location of a mobile device -- could offer an extra layer of security for enterprises trying to manage both company-owned and employee-owned devices. However, the...
View ArticleBlackBerry teams with Samsung and IBM to offer governments a secure tablet
BlackBerry is returning to the tablet market -- this time with the help of Samsung Electronics, IBM and Secusmart, the German encryption specialist BlackBerry bought last year.This is not the PlayBook...
View ArticleAre your business partners secure?
Are your business partners secure? Without giving too much thought to the question, you nod for a moment saying to your self “sure, they are” by, then the confusion starts to wind its way into your...
View ArticleDell support tool put PCs at risk of malware infection
Attackers could have remotely installed malware on systems running a flawed Dell support tool used to detect customers' products.A security researcher discovered the flaw in November and reported it...
View Article166816 (Z66816): A post-RSA Conference recap
After several hours in the airport, followed by several more on a plane, all while being fueled by caffeine, here's the post-RSA Conference wrap-up from Salted Hash.This year's show seemed bigger,...
View ArticleZombie apps haunt BYOD workplaces
According to a new study of around 3 million apps on employee smartphones, 5.2 percent of iOS apps and 3.9 percent of Android apps are actually dead, removed from their respective app stores and no...
View ArticleTesla attack started with a single phone call
Last weekend, Tesla Motors had their website and Twitter accounts hijacked by individuals looking to play a joke.They used their access to deface the company's website and spam a computer repair shop...
View ArticleUS proposes tighter export rules for computer security tools
The U.S. Commerce Department has proposed tighter export rules for computer security tools, a potentially controversial revision to an international agreement aimed at controlling weapons...
View ArticleTop five reasons companies are avoiding managed services
For many small and midsize companies, having someone else remotely monitor and manage their computer network is a no-brainer. The managed service provider can improve efficiency, reliability,...
View ArticleCircleCityCon: Protecting the supply chain
On Saturday, during an early morning session at CircleCityCon in Indianapolis, Akamai's Dave Lewis addressed the topic of supply chain security with the conference's early risers.Over the last year,...
View ArticleAgencies need to pay more attention to supply chain security
Government agencies seeking the lowest bidders typically overlook cybersecurity when awarding contracts, and data breaches are the result, says a security rating expert.According to a review of 25...
View ArticleAccuvant researchers to release open source RFID access tool
Security researchers have long known about the vulnerabilities of the RFID readers that many buildings use instead of door locks, but facilities managers have been slow to upgrade to more secure...
View ArticleICANN website security breached
The Internet Corporation for Assigned Names and Numbers (ICANN) has issued a warning to those who registered with its public website that their profile accounts were accessed by an “unauthorized...
View ArticleUbiquiti Networks victim of $39 million social engineering attack
Ubiquiti Networks Inc., the San Jose based manufactured of networking high-performance networking technology for service providers and enterprises, announced in its fourth quarter fiscal results that...
View ArticleFBI issues supplier scam warning to businesses
The FBI's Internet Complaint Center (IC3) issued a warning last week about a type of scam that has exposed businesses to a total of $1.2 billion in losses, once the numbers from October 2013 until...
View ArticleIDG Contributor Network: How to secure the Internet of Things and who should...
Gartner researchers predict that by 2020 we will have 25 billion connected devices. Meanwhile, PricewaterhouseCoopers’ Global State of Information Security® Survey 2015 says that more than 70 percent...
View ArticleIDG Contributor Network: Spending millions on APT defense? Don’t forget about...
Advanced Persistent Threats has become a very popular term today, whereas companies are spending millions on APT defense. While APT defense is important for many large companies, it should not...
View Article
More Pages to Explore .....