Click on a filter below to refine your search. Remove filter to broaden your search.
|Last 12 months||remove|
Hint: If you don't want the words you enter to be searched for separately, use quotation marks to find people or exact phrases. See our Search Help section for more hints.
From the introduction of "Aaron's Law" to laws being passed to curb the threat of cyber espionage, these are the notable legal developments that caught our attention this year.
At this year's contest in Vancouver, Google is giving researchers a chance to win up to $150,000 for findings serious flaws in its operating system.
An update to the P2P Zeus banking trojan results in the installation of a rootkit driver that makes deleting the malware even tougher.
Inputs.io was left unable to pay an undisclosed number of user balances after the free Bitcoin eWallet service was hacked on Thursday and relieved of 4,100 Bitcoin. That translates to about $1.1 million.
Countries have different regulations on how mobile data can be used, stored and transferred. So what can mobile content and service providers do to solve the problem?
Another week in information security brings us major news items that involve more Snowden leaks, the president proposing new legislation on government surveillance, and interesting research by experts that indicates how smart TVs don't have smart security.
The Federal Trade Commission has charged 12 companies with falsely claiming to comply with the U.S.-EU Safe Harbor Framework.
Prior to its massive breach, Target seems not to have responded to multiple alerts from security company FireEye involving suspicious activity on the retailer's network.
Although it has yet to be discovered in the wild, researchers have uncovered a sneaky piece of financial malware, known as i2Ninja, being sold on a Russian cyber crime forum.
The very trends that have revolutionized users' access to data are the same ones that are leaving networks vulnerable to attacks by cyber criminals.
APT12, the espionage group believed to be behind attacks on The New York Times, is piggy-backing on international interest in the G20 summit to penetrate victims' networks via malicious emails.
Researchers have discovered a Gameover variant of the Zeus trojan that has been modified to include the Necurs rootkit, which makes the malware tougher to detect and remove by protecting files on the disk and memory.
Spamhaus seems to be shrouded in mystery, and rightly so. There is a lot of misinformation out there regarding the service. But, there's one thing I'd like to clear up. Hint: It's all about the approval.
Defence Minister Peter MacKay has committed $20 million to fund projects aimed at making Canada safer from cyber attacks.
A federal judge ordered the National Security Agency (NSA) to stop destroying millions of phone records until at least March 19.
Citing "sources familiar with the matter," independent technology news site Re/code is reported on Friday that Yahoo has tapped Alex Stamos to become its new CISO.
Phyllis Schneck takes a level-headed approach to how the DHS should address potential attacks against critical infrastructure.
This week's news review features stories on the recent class-action suit filed against Target and Trustwave, a study on Advanced Evasion Techniques, and news on millions of home routers that enable DNS amplification DDoS attacks. For more deeper look at these news bits, click here to visit our...
The Province of Ontario's 8.5 million voters may have the option of casting their ballot online in the coming decade, making it the largest jurisdiction in the world to introduce voting by internet.
CSOs need to be able to function at the highest levels of an organization while not being tethered to a specific department or operational function.