The Latest News

  • The Internet of Buggy Things

    It's Time to Patch or Pitch Vulnerable Devices The Internet of Buggy Things

    It's no surprise that virus-wielding hackers are exploiting Internet of Things devices. Blame too many device manufacturers rushing products to market, skimping on secure development practices and failing to audit the third-party code they use. Read more...

  • Logjam Vulnerability: 5 Key Issues

    Don't Rush to Fix 20-Year-Old Flaw, Experts Say Logjam Vulnerability: 5 Key Issues

    While the "Logjam" vulnerability raises serious concerns, there's no need to rush related patches into place, according to several information security experts. Learn the key issues, and how organizations must respond Read more...

  • Massive 'Logjam' Flaw Discovered

    Report: NSA Likely Exploited Flaw to Crack VPNs Massive 'Logjam' Flaw Discovered

    Numerous websites, mail servers and other services - including virtual private networks as well as "all modern browsers" - have a 20-year-old flaw that could be exploited by an attacker, computer scientists warn. Read more...

  • Feds Charge Chinese with Insider Theft

    DoJ: Secrets from U.S. Firms Used to Start Up a Chinese Venture Feds Charge Chinese with Insider Theft
    A lab at Skyworks Solutions, where trade secrets were allegedly pilfered.

    Federal authorities have arrested a Chinese professor, accusing him of pilfering trade secrets from the computer systems of American high-tech companies where he and a co-conspirator once worked. Read more...

  • Promoting Cyber Norms of Behavior

    Senate Panel Hears Experts Address Nation-State Cyberthreats Promoting Cyber Norms of Behavior
    State Department's Christopher Painter testifies before a Senate panel.

    To battle nation-state cyberthreats, the U.S. must work with its allies to develop norms of behavior in cyberspace that could then be adopted by other nations, experts said at a Senate hearing. Read more...

  • Article

    PCI: 5 New Security Requirements

    New Task Force Created to Assist Smaller Merchants By Tracy Kitten
    PCI: 5 New Security Requirements

    Five best practices noted in version 3.0 of the PCI Data Security Standard will become requirements after June 30, with remote access and third-party risks the key focus - particularly for smaller merchants.

  • Interview

    Warning: Security Alert Overload

    Expert Says Warnings and Alert Messages Are Failing Us By Mathew J. Schwartz
    Warning: Security Alert Overload

    Vendors' and software makers' over-reliance on security messages and warnings has left users habituated to them, thus rendering such alerts less effective or even worthless, warns cybersecurity expert Alan Woodward.

  • Blog

    How VA Keeps Medical Devices 'Clean'

    CIO Offers Best Practices for Securing Devices By Marianne Kolbasuk McGee
    How VA Keeps Medical Devices 'Clean'

    In the wake of recent alerts about infusion pump security vulnerabilities, now's a good time for all healthcare organizations to reassess their basic practices for keeping medical devices secure and safe. Check out what the VA is doing.

  • Article

    IRS: 100,000 Taxpayer Accounts Breached

    Stolen PII Helped Hackers Evade Authentication Defenses By Eric Chabrow
    IRS: 100,000 Taxpayer Accounts Breached

    Using personal information gained from third-party sources to circumvent authentication protections, hackers breached 100,000 accounts of taxpayers who had used the IRS's "Get Transcript" application, which has been temporarily shuttered.

  • Article

    Senate Delays NSA Bulk Collection Vote

    Will Reconvene May 31 to Decide Whether to Scrap Program By Howard Anderson
    Senate Delays NSA Bulk Collection Vote

    The U.S. Senate has delayed until May 31 a decision on whether to follow the House and approve a proposal to scrap the National Security Agency's bulk collection of Americans' telephone metadata.

More news...

Webinars

More webinars...

White Papers

More whitepapers...
ARTICLE Infographic: U.S. Migration to EMV

The U.S. migration from magnetic-stripe payment cards to EMV-compliant cards is in full swing,...

Latest Tweets and Mentions

ARTICLE Infographic: U.S. Migration to EMV

The U.S. migration from magnetic-stripe payment cards to EMV-compliant cards is in full swing,...

The ISMG Network