Latest News

News

Audit: FBI's threat prioritization process too subjective and sluggish

The FBI's process for prioritizing cyberthreats is too slow and subjective, hindering its ability to optimize allocation of resources to address these dangers, according to a new report from the DoJ's Office of the Inspector General.

News

2.3 million 'Warframe,' 'Clash of Kings' accounts compromised

More than 2.3 million users records were compromised as two separate gaming companies announced they suffered data breaches.

News

MS-ISAC official: Ransomware top priority

Ransomware threats targeting government IT systems nationwide at the state and local level are steadily increasing.

News

Microsoft EOP exposes users to data breaches, whitepaper

Vircom researchers believe that Microsoft Exchange Online Protection (EOP) may be exposing users and their networks to both data breach and data loss risks.

News

Auto-ISAC release automotive cybersecurity best practices

The Automotive Information Sharing and Analysis Center (Auto-ISAC) Thursday released a set of automotive cybersecurity "Best Practices."

News

PowerWare ransomware variant poses as Locky, but can be decrypted

The ransomware PowerWare that commandeers Microsoft's PowerShell utility to download and run malicious code, now has a variant that mirrors Locky ransomware.

News

Germany proposes legislation for 'black boxes' on cars using autopilot

Self-driving cars in Germany may soon be required to carry a black box to help determine fault.

News

EFF lawsuit challenges DMCA Section 1201

The EFF filed an injunction against the DoJ, Library of Congress, Copyright Office and U.S. officials, challenging Section 1201 of the Digital Millennium Copyright Act.

News

CrypMIC ransomware is a CryptXXX copycat, with a few twists

CryptXXX ransomware has a doppelganger - it's called CrypMIC. And the resemblance doesn't appear to be a coincidence.

News

BlackBerry CEO calls helping law enforcement 'civic duty,' takes swipe at Apple

Cooperating with law enforcement is "our basic civic responsibility," BlackBerry CEO John Chen told reporters at a media Q&A at the BlackBerry Security Summit in New York.

Data Breach Blog

NC State breach affects 38,000

An attacker gained unauthorized access to a North Carolina State University account containing personally identifiable information.

Featured News

WordPress Summer of Pwnage: 64 holes in 21 days

WordPress Summer of Pwnage: 64 holes in 21 days

As the Pwnage summer heat rages on, hackers find 64 holes in popular publishing platform, WordPress

Women in IT Security Issue Live Now!

The Threat Hunter Blog

Locky and Dridex - New Wine in Old Bottles

Locky and Dridex - New Wine in Old Bottles

The computer media has been screaming it for the past few days: Locky is back! Dridex is back! Of course they are... these are two of the most prolific - and prosperous - malwares around at the moment.

July 2016 Product Reviews

Citrix XenMobile

First-rate product for mobile application management (MAM), easy on users in a BYOD environment.

IBM MaaS360

This is a real powerhouse, but best for organizations with an IT force experienced in enterprise-level mobile device management.

Opinions

Speak the board's language or get fired

Speak the board's language or get fired

A communication gap exists today between CISOs and the board of directors, says Feris Rifai, CEO, Bay Dynamics.

Government surveillance from Caesar to Nixon

Government surveillance from Caesar to Nixon

Government surveillance is, however, not new, says Patrick O'Kane, barrister and compliance counsel.

RECENT COMMENTS

Sign up to our newsletters

FOLLOW US