EMV migration delay doesn’t let gas stations completely off the hook
Last week, Visa, MasterCard and American Expressed delayed the EMV migration deadline for gas stations from October 2017 to October 2020 — but that doesn’t…
Obama’s cybersecurity recommendations a small step forward, but need teeth and political willpower
Last week’s report by the nonpartisan Commission on Enhancing National Cybersecurity recommended training 100,000 new cybersecurity professionals and increasing federal R&D funding for cybersecurity by…
Security pros most worried about clouds, mobile
Companies were least prepared to assess the security risks of cloud and mobile technologies, according to a survey of cybersecurity professionals released this morning.Around 60…
AI is coming, and will take some jobs, but no need to worry
The capabilities of artificial intelligence and machine learning are accelerating, and many cybersecurity tasks currently performed by humans will be automated. There will still be…
Scholars, infosec experts call for action on Russian hacking
In the wake of reports about Russian involvement in fake news and hacks against political targets leading up to the recent presidential election, scholars and…
Report: Only 6% of businesses use DMARC email authentication, and only 1.5% enforce it
In a study of 1 million corporate domains, only 60,000 had made any attempt at DMARC email authentication, and of those, only a quarter actually…
SIEMs-as-a-service addresses needs of small, midsize enterprises
The city of Lewiston, in north central Idaho, has a population of around 32,000 and an information systems budget of around $800,000 a year.But it…
Report: Most cybercriminals earn $1,000 to $3,000 a month
Most cybercriminals make between $1,000 and $3,000 a month, but 20 percent earn $20,000 a month or more, according to a recent report.The data is…
The Dark Web: What to know about the underground Internet
There’s more to the Internet than most people are aware of.
Ransomware victims able to thwart attacks, report says
The vast majority of companies hit by ransomware attacks were able to stop the attacks by either preventing the malware from getting to their files,…
Battling global DDoS attacks requires coordinated response
Service providers that run the backbone of the internet need to have a coordinated response to deal with a global distributed denial of service attack,…
Report: Surveillance cameras most dangerous IoT devices in enterprise
Networked security cameras are the most likely to have vulnerabilities when it comes to securing Internet of Things devices in the enterprise, according to a…
Security experts divided on ethics of Facebook’s password purchases
Last week, Facebook CSO Alex Stamos told conference attendees in Lisbon that the company buys stolen passwords on the black market, and some security experts…
Visibility, security top concerns for cloud computing adoption
Enterprises considering adopting public clouds are concerned about where their data is located and how it’s protected, according to a new survey by IDG.Companies will…
AI makes security systems more flexible
Advances in machine learning are making security systems easier to train and more flexible in dealing with changing conditions, but not all use cases are…
Flood of threat intelligence overwhelming for many firms
Three years after Target missed alerts warning them about a massive data breach, the amount of threat information coming in from security systems is still…
Unencrypted pagers a security risk for hospitals, power plants
For most of us, pagers went out when cell phones came in, but some companies are still using them and when the messages are sent…
Why don’t developers have a ‘spellchecker’ for security’?
Despite all the news coverage about successful cyberattacks, developers are still writing code full of security vulnerabilities.Of course, nobody is perfect. We all make mistakes,…
Russian criminals’ bank attacks go global
Russian cybercriminals have field tested their attack techniques on local banks, and have now begun taking them global, according to a new report — and…
Flash mobs the latest threat this holiday season
The holiday season rings in more than just higher sales for retailers. There’s also more shoplifting and lower profit margins than the rest of the…
Cybersecurity ‘ninjas’ value challenges, training and flexible schedules over pay
Challenging work, skills training and flexible work hours are important for all cybersecurity employees, but especially so for the highest skilled workers, according to a…
Researcher unveils second Samsung Pay vulnerability
Samsung just can’t catch a break these days. Its phones are exploding, and so are its washing machines, and now a security researcher has found…
Yahoo shows that breach impacts can go far beyond remediation expenses
Companies that focus on the immediate breach remediation costs may be missing the big picture, and could be under-investing in security as a result.Several studies…
Enterprises outsmarting themselves with security, while attackers easily use common techniques
Bad guys use common techniques to steal data, while companies focus too much on sophisticated attacks, according to the second annual Hacker’s Playbook, based on…
Leaky IoT devices help hackers attack e-commerce sites
Millions of IoT devices are misconfigured so that they can forward messages — which, combined with default admin settings, allows them to be used to…
How Shodan helped bring down a ransomware botnet
Shodan is a search engine that looks for internet-connected devices. Hackers use it to find unsecured ports and companies use it to make sure that…
Data leaks evolving into weapons of business destruction
Most of the recent data breaches involve customer information such as user names and passwords, credit card numbers, and medical histories. The companies hacked are…
Diversified supply chain helps ‘Vendetta Brothers’ succeed in criminal business
Even smaller criminal groups are using smart business tactics to help insulate them from risk, such as the Vendetta World online shop, which sells credit…
73% of companies using vulnerable end-of-life networking devices
Seventy-three percent of companies are using vulnerable, end-of-life networking equipment, up from 60 percent last year, according to a new analysis of more than 212,000…
Spreading Security: California bank arms businesses with cybersecurity education, software and insurance
Cybercriminals could be getting better, and more creative, at stealing money from businesses.