In an attempt to put the issue to rest, the agency warned businesses against blocking guests' personal hotspots.
Vladimir Drinkman, who was arrested in the Netherlands in 2012 and has been fighting extradition since, will face hacking charges in a New Jersey court.
A security engineer from Citrix demonstrated the Maldrone malware that he built as a backdoor to control drones.
Focus: Cyber Threats
Source code for the keylogger, called QWERTY, was published in Snowden documents.
This is another market area that has seen a lot of change over the past few years.
The year's Innovators in this group focus on security management in a cloud or virtual environment.
Data protection is a fuzzy, sometimes nebulous term. Certainly everything we do on the network is intended to protect the data on it. In an era of widely dispersed global enterprise the data often seems to be alone on the internet.
Security infrastructure is another one of those ever-changing categories. What looked like infrastructure a few years ago is, for the most part, long gone.
Hall of Famers are in their third consecutive year of appearing here and that sends the strong message that they are Innovators and they have staying power.
Data Breach Blog
The wolf isn't at your door, it's inside. Ignorance is definitely not bliss. Just ask any of the regulatory agencies.
Sign up to our newsletters
SC Magazine Articles
- Don't dismiss internal data breaches as minor - they aren't!
- Firm finds link between Regin spy tool and QWERTY keylogger
- Insider threats changing security spending, report says
- New attack uses ransomware to drop trojans and keyloggers
- Size and frequency of DDoS attacks increasing, annual report shows