Shaming is a step forward, but more work is needed for faster smartphone patching
Shaming carriers and smartphone manufacturers into applying patches faster is a step forward, but a lot more needs to be done to improve security of…
Surescripts opts for easier, faster UBA deployment
Surescripts is not a data science company. But as the largest health information network in the country, they’ve gotten good at handling Big Data. And…
93% of phishing emails are now ransomware
As of the end of March, 93 percent of all phishing emails contained encryption ransomware, according to a report released today by PhishMe. That was…
Laptop updaters riddled with security holes
A recent test of pre-installed updater software on 10 laptops showed that every single one had security problems.”We went and bought about 10 laptops,” said…
Will your backups protect you against ransomware?
In theory, nobody should be paying any money to the ransomware extortionists. Doesn’t everyone have backups these days? Even consumer has access to a wide…
Second-factor may prevent ATM fraud
Crooks stole $12.7 million at 1,400 Japanese ATMs earlier this month, with around 100 people making 14,000 transactions with 1,600 counterfeit credit cards based on…
Regulators: cybersecurity poses biggest risk to global financial system
Last week, the chair of the Securities and Exchange Commission called cybersecurity the biggest risk facing the global financial industry. “Cyber risks can produce far-reaching…
60% of enterprise phones still vulnerable to QSEE exploit
Most enterprise users with Android phones are still vulnerable to an exploit that allows attackers to get into their phone’s Qualcomm Secure Executive Environment and…
Cybercriminal business model vulnerable to intervention
Cybercrime may be booming but its business model is vulnerable on many fronts, according to a new report.”We’ve been observing that they’ve been acting like…
Terrorists opt for consumer tools
Although cybercriminals have been turning out specialized hacking and attack tools at a rapid pace, terrorists are often using legitimate, consumer-focused technologies, according to a…
Criminals taking a bigger bite of health breaches
The percentage of health care data breaches due to criminals has risen from 20 to 50 percent since 2010, but health care organizations are failing…
Retailers must upgrade authentication, encryption and pen testing
The PCI Security Standards Council now requires better authentication, encryption and penetration testing by companies that accept consumer payments, improvements lauded by security experts.”There are…
10 companies that can help you fight phishing
According to the most recent Verizon data breach report, a phishing email is often the first phase of an attack. That’s because it works well,…
DDoS costs, damages on the rise
Peak-time distributed denial-of-service attacks cost organizations more than $100,000 per hour, said half of the respondents to a new survey of mid-sized and large corporations…
DDoS costs, damages on the rise
Peak-time distributed denial-of-service attacks cost organizations more than $100,000 per hour, said half of the respondents to a new survey of mid-sized and large corporations…
Security pros concerned about Facebook payment expansion
Facebook’s Messenger app has allowed users to send money to friends using their debit cards since last spring, but recent reports indicate that Facebook may…
Enterprises fall behind on protecting against phishing, detecting breaches
The ninth annual Verizon Data Breach Report came out this morning with bad news on multiple fronts, including click-through rates on phishing messages, how long…
Phishing emails leverage unique subject lines, Office docs
Phishing emails continued to evolve last year, according to a new report from PhishMe, with Microsoft Office documents and unique subject lines used to get…
CEO targeted by fraud twice a month
Every couple of weeks or so, Tom Kemp’s company gets hit by ever-more-sophisticated attempts to trick them out of large sums of money. It started…
New sensors help reduce supply chain risks
Better sensors help companies reduce shipping risks and react faster to disruptions, but costs and deployment challenges are still slowing adoption.According to a Capgemini Consulting…
Survey: Health care industry most targeted by cyberattackers
According to a survey released this morning by 451 Research, 63 percent of health care industry respondents said they had experienced a breach, the highest…
Only a third of companies know how many vendors access their systems
The average company’s network is accessed by 89 different vendors every week, according to a new research report that surveyed more than 600 IT decision…
Only a third of companies know how many vendors access their systems
The average company’s network is accessed by 89 different vendors every week, according to a new research report that surveyed more than 600 IT decision…
Only a third of companies know how many vendors access their systems
The average company’s network is accessed by 89 different vendors every week, according to a new research report that surveyed more than 600 IT decision…
Symantec: Zero-days doubled in 2015, more companies hiding breach data
Fifty-four zero-day vulnerabilities were discovered last year, according to a report released this morning by Symantec, more than double that of 2014, and the number…
Symantec: Zero-days doubled in 2015, more companies hiding breach data
Fifty-four zero-day vulnerabilities were discovered last year, according to a report released this morning by Symantec, more than double that of 2014, and the number…
Millions of child support records stolen, D.C. officials want answers
In early February, a thief broke into several offices in Olympia, Washington to steal anything he could grab that was worth selling. In one locked…
Is the blockchain good for security?
Overstock was one of the first online retailers to adopt Bitcoin in a big way. Now it’s become the first major company to issue stock…
Feds tackle open source code quality
Even as the White House is calling on federal agencies to make more use of open source projects, there’s also a federal effort under way…
Merging firms appealing targets for attackers
Companies going through a merger or acquisition, as well as their lawyers, financial advisers, and other associated firms are all tempting targets for cyberattackers, according…