VTech not backing down on terms change after data breach
Despite widespread public condemnation, Hong Kong toy maker VTech is not backing down from a change in its Terms and Conditions ducking its responsibilities in…
Report: Breaches responsible for increasing amount of collateral damage
2015 was the “Year of Collateral Damage,” according to a report released this morning by Hewlett Packard Enterprise.Attackers targeting companies or other organizations are not…
Study finds that anti-crypto laws won’t work on an international stage
In response to attempts to put restrictions on encryption technology, a new report surveys 546 encryption products in 54 countries outside the United States, out…
IBM’s X-Force team hacks into smart building
As buildings get smarter and increasingly connected to the Internet, they become a potential vector for attackers to target.IBM’s X-Force ethical hacking team recently ran…
China’s next five-year plan offers preview of cybersecurity targets
Is your industry next in line to be targeted by China’s government-sponsored hackers? To find out, look at China’s latest five-year plan, suggests a global…
Survey: Average successful hack nets less than $15,000
The majority of cyber attackers are motivated by money, but make less than $15,000 per successful attack, according to a survey of hackers in the…
27% of all malware variants in history were created in 2015
Last year was a record year for malware, according to a new report from Panda Security, with more than 84 million new malware samples collected…
Cybersecurity pros switch jobs for challenging work, pay, and flexible hours
Cybersecurity pros are most likely to leave to find more challenging work, better pay, and more flexible working hours, according to a survey released this…
Over 113 million health records breached in 2015 — up 10-fold from 2014
One out of every three Americans was affected by a healthcare record breach last year, or more than 113 million people, up more than 10-fold…
Preparation lowers long-term post-breach costs
Preparation can significantly lower the long-term costs of a breach, according to a SANS report released this morning. Companies that had plans in place, that…
Reporting to CEO reduces risks and costs, but change comes slowly
An increasing number of experts are urging companies to stop having the CSOs and CISOs report to the CIO in order to reduce conflict of…
Telephonic DoS a smokescreen for cyberattack on Ukrainian utility
The late December telephonic denial-of-service attack against a Ukrainian power company was a smokescreen to cover up a cyber attack, experts say.”This is one of…
Report: Cybersecurity pros losing confidence
Security professionals were less confident in their security infrastructure in 2015 than in 2014, according to a report released today by Cisco.In 2014, 64 percent…
Linux zero-day affects most Androids, millions of Linux PCs
A new zero-day vulnerability has been discovered that allows Android or Linux applications to escalate privileges and gain root access, according to a report released…
Security pros worried about stolen credentials, alert volumes
The majority of security organizations received more alerts than they can handle and don’t have a way to spot stolen credentials, according to a survey…
RIG exploit kit takes over while Angler on vacation
The Angler exploit kit went on vacation during the first two weeks of the year, but the Russia-hosted RIG exploit kit was there to ensure…
DDoS attack on BBC may have been biggest in history
Last week’s distributed denial of service attack against the BBC website may have been the largest in history.A group calling itself New World Hacking said…
Silent Circle patches Blackphone vulnerability
A report released this morning shows that no phone is 100 percent secure — but that one company, at least, is able to respond quickly…
Global geopolitical risk predictions for 2016
The previous 25 years have been marked by globalization. A number of forces acted together to bring our planet closer together. Trade pacts, peacekeeping alliances,…
PhishMe report shows employees can become assets in anti-phishing battle
A report released today by PhishMe based on the results of 8 million phishing simulations shows that employees can dramatically improve their ability to detect…
PhishMe report shows employees can become assets in anti-phishing battle
A report released today by PhishMe based on the results of 8 million phishing simulations shows that employees can dramatically improve their ability to detect…
Lost devices account for bulk of healthcare security incidents
Due to reporting guidelines, lost and stolen devices account for 45 percent of all breaches in Verizon’s new health care data breach report, accounting for…
Firms expect fines, new costs from Safe Harbor changes
IT budgets are expected to see a rumble of activity in the wake of the Safe Harbor earthquake.In a new Ovum survey of IT decision…
Darkode forum is back, but a shadow of its former self
Last summer, law enforcement agencies from 20 countries joined forces to shut down the notorious Darkode hacking forum. Organizers said they would be back, stronger…
Darkode forum is back, but a shadow of its former self
Last summer, law enforcement agencies from 20 countries joined forces to shut down the notorious Darkode hacking forum. Organizers said they would be back, stronger…
US cyber criminal underground a shopping free-for-all
According to a new report by Trend Micro, the North American cyber criminal underground isn’t buried as deep as in other geographies. “It doesn’t exist…
US cyber criminal underground a shopping free-for-all
According to a new report by Trend Micro, the North American cyber criminal underground isn’t buried as deep as in other geographies. “It doesn’t exist…
Report: Scripting languages most vulnerable, mobile apps need better crypto
According to an analysis of over 200,000 applications, PHP is the programming language with the most vulnerabilities, mobile apps suffer from cryptography problems, and developers…
Report: Scripting languages most vulnerable, mobile apps need better crypto
According to an analysis of over 200,000 applications, PHP is the programming language with the most vulnerabilities, mobile apps suffer from cryptography problems, and developers…
Most hackable devices
Consumer devices vulnerableThere are now more than 3 billion connected devices in use by consumers, according to Gartner, and this number will increase to 4…