Industry Insight News, Articles and Updates

University of Michigan researchers remotely pick locks of Samsung SmartThings connected home systems

University of Michigan researchers remotely pick locks of Samsung SmartThings connected home systems

By

In a series of attacks, University of Michigan researchers hacked into Samsung SmartThings connected home systems and remotely unlocked doors.

Where are all the security pros?

Where are all the security pros?

By

IT security is finally becoming a priority - not only for IT professionals in every industry, but also for the C-suite, says Marcin Kleczynski, CEO, Malwarebytes.

Who owns information security risk in your organization?

Who owns information security risk in your organization?

Security is a business risk that needs to be understood and owned by your business leaders, says Jeff Brown, former technology risk officer, AIG.

Hot or not, this industry is still growing up

By

Even with all the hoopla, there are CISOs still having challenges, vendors that aren't meeting needs, and companies still giving security short shrift, says Illena Armstrong, VP editorial, SC Magazine.

Educating boards

Educating boards

By

C-suites and boards of directors are increasing their knowledge of IT security risks and needs - before a breach happens. Larry Jaffee reports.

RSA EMEA Summit: Writing a security strategy that will make Vivaldi proud

RSA EMEA Summit: Writing a security strategy that will make Vivaldi proud

Richard Nichols, RSA's head of EMEA strategy compared playing the violin to conducting an effective security strategy, to encourage businesses to harmonise security strategy and promote greater visibility of threats on the business.

DDoS attacks still growing...and stronger, Kaspersky

DDoS attacks still growing...and stronger, Kaspersky

By

Cybercriminals are strengthening their DDoS attacks with more amplification and new methods to refine their botnets.

Automakers, Uber, Google form Self-Driving Coalition for Safer Streets as GAO releases vehicle cybersecurity report

Automakers, Uber, Google form Self-Driving Coalition for Safer Streets as GAO releases vehicle cybersecurity report

By

Automakers form join forces in the Self-Driving Coalition for Safer Streets coalition one day after the GAO released auto cybersecurity report.

Cyberattacks increase against manufacturing, healthcare industries

Cyberattacks increase against manufacturing, healthcare industries

By

Report examines the shifting direction of cyberattacks noted attackers turning their attention away from financial services, in favor of attacks against manufacturing and healthcare companies.

Most orgs couldn't quickly detect breach, study

Most orgs couldn't quickly detect breach, study

By

Researchers at DB Networks and Osterman Research find many orgs lack the proper tools to monitor their data bases.

Google's Android Security report shows some Android users left behind

Google's Android Security report shows some Android users left behind

By

Despite the many efforts Google undertakes to protect its customers from malicious applications, many Android users may remain vulnerable to attack because they're using outdated software.

Data breaches fueled valuations of cyber firms

Data breaches fueled valuations of cyber firms

By

Stoked by headlines announcing major data breaches, the stock valuations of cybersecurity companies outperformed the Nasdaq and S&P 500 by double over the past three years.

CCOs fear increased liability from recent compliance changes in Washington

CCOs fear increased liability from recent compliance changes in Washington

By

Recent changes in Washington have led to CCOs fearing that they may be held personally responsible for the misconduct of their employers.

Oculus exec says VR privacy questions will be answered 'in due time'

Oculus exec says VR privacy questions will be answered 'in due time'

By

Oculus exec says U.S. Senator's privacy policy questions on VR data collection will be answered "in due time."

Millennials more likely to store sensitive data on mobile devices, study

Millennials more likely to store sensitive data on mobile devices, study

By

An Equifax study found millennials were more likely to store sensitive data on their personal devices.

Research: Over 6,000 data breaches in key industry sectors since 2005

Research: Over 6,000 data breaches in key industry sectors since 2005

By

The Identity Theft Resource Center (ITRC) and IDT911 said that to date, the financial services, business, education, government and healthcare industrial sectors have experienced over 6,000 data breaches since 2005.

Cybersecurity new atom bomb, says Apple co-founder Steve Wozniak

Cybersecurity new atom bomb, says Apple co-founder Steve Wozniak

By

Cybersecurity is the greatest threat since the atom bomb, said Apple co-founder Steve Wozniak.

The anatomy of a spearphishing scam, or how to steal $100M with a fake email

The anatomy of a spearphishing scam, or how to steal $100M with a fake email

By

Stealing $100 million from a major U.S. corporation should be hard than setting up a fake email account, but for one cybercriminal enterprise this is all it took.

Malware in surveillance cameras sold on Amazon

Malware in surveillance cameras sold on Amazon

By

Malware allegedly found in Urban Security Group's (USG) Sony Chip HD 6 Camera 1080P PoE IP CCTV surveillance camera kit.

Massive DDoS attack could spell trouble for standard protections

Massive DDoS attack could spell trouble for standard protections

By

Imperva researchers spotted an unusually large DDoS attack that used a unique method which bypasses standard hybrid DDoS protections.

Energy execs may be too confident in ability to detect threats as cyber attacks increase

Energy execs may be too confident in ability to detect threats as cyber attacks increase

By

A Tripwire survey found energy executives may be overconfident in their organizations' ability to detect threats.

Reports find high security risks among policies for third-party vendors

Reports find high security risks among policies for third-party vendors

By

Two new reports examine the security and privacy threats posed by procedures in working with third-party vendors.

Hack-for-hire services booming, new report

Hack-for-hire services booming, new report

By

Hackers are offering their services to break into corporate email for anyone paying $500, according to a new report from Dell SecureWorks.

Survey finds 'accountability gap' among execs dealing with cybersecurity

Survey finds 'accountability gap' among execs dealing with cybersecurity

By

The cybersecurity "accountability gap" is growing, as many executives say they don't feel responsible for cyber attacks.

PayPal vulnerabilities could have allowed phishing emails

PayPal vulnerabilities could have allowed phishing emails

By

A researcher netted $500 from PayPal's bug bounty program for a vulnerability that could have allowed phishing and other attacks.

Remote execution vulnerability found in Lhasa library

Remote execution vulnerability found in Lhasa library

By

Cisco's security team disclosed a vulnerability in the Lhasa LZH/LHA decompression tool and library that could allow remote code execution.

Google nose it's you, a new angle to facial recognition for security

Google nose it's you, a new angle to facial recognition for security

By

Google researchers are experimenting with real-time facial recognition that continuously authenticates users from a mobile phone's viewpoint.

Senator calls for national automotive cybersecurity lab

Senator calls for national automotive cybersecurity lab

By

U.S. Senator Gary Peters (D-Mich.) is pushing to establish a national automotive cybersecurity laboratory.

Developer's 11 lines of deleted code 'breaks the internet'

Developer's 11 lines of deleted code 'breaks the internet'

Web development around the world was disrupted when a 28-year-old man deleted 11 lines of his code from npm.

Enterprises should be "compromise ready," says new report

Enterprises should be "compromise ready," says new report

By

Phishing, hacking and malware attacks led to nearly a third of data security incidents during 2015, unlike the previous year when human error was cited the primary cause, according to the latest BakerHostetler Data Security Incident Response Report.

RECENT COMMENTS

Sign up to our newsletters

FOLLOW US