Merging firms appealing targets for attackers
Companies going through a merger or acquisition, as well as their lawyers, financial advisers, and other associated firms are all tempting targets for cyberattackers, according…
How virtual reality could transform health care
For those who ordered early, the long-awaited Oculus Rift starts shipping today, the HTC Vive is expected to officially ship April 5, and Sony’s Playstation…
FBI, Apple battle may leave lasting legacy
The FBI may have backed off from its demand that Apple build a backdoor to an iPhone security mechanism, for now at least, but experts…
27% of US office workers would sell their passwords
In a survey released today, 27 percent of of U.S. office workers at large companies would sell their work password to an outsider, compared to…
FTC orders nine PCI auditors to share assessment details
The FTC is on a data breach enforcement roll. Last summer, the courts allowed it to fine companies with weak cybersecurity practices. Now, the FTC…
Cybersecurity no longer merger afterthought
As little as four years ago, only about a third of companies considered cybersecurity when planning a merger. Today, that percentage has flipped.”When you look…
Next-generation endpoint security tools ready to replace antivirus
The market for next-generation endpoint security tools has doubled each of the last two years, and will continue to grow at a compound annual growth…
Cybercriminals face hacker talent shortage
Cybercriminals and hacktivists face many of the same hiring problems as defending security organizations, but with their own particular twists, according to report released this…
Verizon releases first-ever data breach digest with security case studies
Verizon is known for its huge annual Data Breach Investigations Report, but this morning it released a less data-heavy digest organized by case study.The digest…
Firms expect greater government cybersecurity oversight
The U.S. Senate recently proposed a cybersecurity disclosure bill that would require public companies to describe what cybersecurity expertise their boards have, or, if they…
VTech not backing down on terms change after data breach
Despite widespread public condemnation, Hong Kong toy maker VTech is not backing down from a change in its Terms and Conditions ducking its responsibilities in…
IBM’s X-Force team hacks into smart building
As buildings get smarter and increasingly connected to the Internet, they become a potential vector for attackers to target.IBM’s X-Force ethical hacking team recently ran…
Survey: Average successful hack nets less than $15,000
The majority of cyber attackers are motivated by money, but make less than $15,000 per successful attack, according to a survey of hackers in the…
Reporting to CEO reduces risks and costs, but change comes slowly
An increasing number of experts are urging companies to stop having the CSOs and CISOs report to the CIO in order to reduce conflict of…
Telephonic DoS a smokescreen for cyberattack on Ukrainian utility
The late December telephonic denial-of-service attack against a Ukrainian power company was a smokescreen to cover up a cyber attack, experts say.”This is one of…
Linux zero-day affects most Androids, millions of Linux PCs
A new zero-day vulnerability has been discovered that allows Android or Linux applications to escalate privileges and gain root access, according to a report released…
DDoS attack on BBC may have been biggest in history
Last week’s distributed denial of service attack against the BBC website may have been the largest in history.A group calling itself New World Hacking said…
Darkode forum is back, but a shadow of its former self
Last summer, law enforcement agencies from 20 countries joined forces to shut down the notorious Darkode hacking forum. Organizers said they would be back, stronger…
US cyber criminal underground a shopping free-for-all
According to a new report by Trend Micro, the North American cyber criminal underground isn’t buried as deep as in other geographies.”It doesn’t exist in…
Most hackable devices
Consumer devices vulnerableThere are now more than 3 billion connected devices in use by consumers, according to Gartner, and this number will increase to 4…
10 riskiest applications that have passed their expiration dates
ExpiredImage by ThinkstockApplications that have reached the ends of their lives are no longer maintained by their original developers, and do not receive security updates.…
Despite recent moves against Adobe, 80% of PCs run expired Flash
Despite recent moves against Adobe Flash by Google and Firefox and its declining use by websites, Adobe Flash remains a significant security vulnerability for end…
Experts urge caution when putting health data in the cloud
Healthcare has become a favorite target for criminals, and some medical organizations are reacting by looking at outside providers to keep their data secure. But…
Does security awareness training even work?
The other day, I was in a room full of CIOs, CTOs and CISOs who — as an ice-breaking activity — were asked to share…
As containers take off, so do security concerns
Containers offer a quick and easy way to package up applications and all their dependencies, and are popular with testing and development.According to a recent…
Corebot cleverly written botnet malware with growth potential
There’s a new botnet malware on the loose, called Corebot, that researchers believe has the potential to develop into a significant threat.The malware was first…
Attackers go on malware-free diet
To avoid detection, some hackers are ditching malware and living “off the land” — using whatever tools are already available in the compromised systems, according…
MIT scores worst in cybersecurity
In a cybersecurity survey of 485 large colleges and universities, the Massachusetts Institute of Technology came in at the bottom of the list.In a report…
Security experts mostly critical of proposed threat intelligence sharing bill
This fall, the Senate is expected to take another look at the Cybersecurity Information Sharing Act, or CISA, but many security experts and privacy advocates…
Ashley Madison still a top lure for scammers and crooks
The Ashley Madison breach has been a Christmas-in-August present for spammers and scammers of all kinds, and your company could be the next target. Here…