The Latest News

  • GAO Sees FAA Air Traffic System at Risk

    Senators Want FAA to Explain How It Will Fix Problems GAO Sees FAA Air Traffic System at Risk
    Watchdogs: Air traffic control systems are at "unnecessary risk." (FAA photo)

    Because of lax information security controls, the systems that control air traffic in the United States are at "increased and unnecessary risk," GAO says. Leaders of the Senate panel with FAA oversight want to know why. Read more...

  • Cool Reception for Obama's Privacy Plan

    Businesses Would Help Define Consumer Privacy Bill of Rights Cool Reception for Obama's Privacy Plan
    Commerce Secretary John Bryson backs the Consumer Privacy Bill of Rights.

    The Obama administration's discussion draft for a Consumer Privacy Bill of Rights law has some of the president's usual supporters saying they're disappointed in his proposal. Find out why. Read more...

  • Congress Averts DHS Partial Shutdown

    Lamakers Fund the Department for Seven Days Congress Averts DHS Partial Shutdown

    Congress, at the 11th hour, passed a bill to fund the Department of Homeland Security for the next seven days, averting for now a partial shutdown that would have curtailed some cybersecurity programs. Read more...

  • Clapper: Cyberthreats to Worsen

    National Intelligence Director Blames Iran for Casino Hack Clapper: Cyberthreats to Worsen
    National Intelligence Director James Clapper testifies before a Senate panel.

    The director of national intelligence, James Clapper, paints a grim picture of the cyberthreats the nation faces, saying as bad as 2014 was, 2015 and the coming years will be worse. Read more...

  • FCC Adopts 'Net Neutrality' Rule

    New Rule Extends Privacy Protections to Customers FCC Adopts 'Net Neutrality' Rule
    The Federal Communications Commission

    The FCC's new "net neutrality rule," which prevents ISPs from slowing down content streaming along their networks and from charging extra fees to assure faster speed, includes provisions designed to protect the confidential information of customers. Read more...

  • Article

    Anthem Attribution to China: Useful?

    Report Links Breach to Chinese Professor; Experts Respond By Mathew J. Schwartz
    Anthem Attribution to China: Useful?

    A new report details new clues suggesting that the massive data breach involving health insurer Anthem was launched by Chinese hackers. But will such evidence help businesses blunt future APT attacks?

  • Article

    Apple Pay: Authentication a Soft Spot

    Mobile a Breeding Ground for Counterfeit Card Fraud By Tracy Kitten
    Apple Pay: Authentication a Soft Spot

    New exploits linked to Apple Pay aren't compromising the mobile device's security, but instead are taking advantage of lax authentication practices used by banking institutions to verify cards that are loaded to the iPhone for Apple Pay purchases.

  • Article

    Lenovo Promises: No More Bloatware

    PC Maker Offers Clean Windows Builds, Full Transparency By Mathew J. Schwartz
    Lenovo Promises: No More Bloatware

    Lenovo, the world's largest PC manufacturer, promises to stop preinstalling any software on its Windows laptops that doesn't need to be there. The move comes following security alerts relating to the Superfish adware the company had been preinstalling.

  • Article

    Questioning Gemalto's Reaction to Hack

    Company's One-Week Investigation Downplays the Impact By Mathew J. Schwartz
    Questioning Gemalto's Reaction to Hack

    SIM card manufacturer Gemalto says its investigation into a reported U.S. and U.K. intelligence agency espionage operation found that its internal networks housing encryption keys weren't breached. But security experts question those findings.

  • Article

    Lenovo Website Hijacked

    Lizard Squad Takes Credit, Says It Has Stolen E-Mails By Mathew J. Schwartz
    Lenovo Website Hijacked

    The hacking group Lizard Squad has claimed credit for hijacking the website of Lenovo.com and redirecting visitors to an attacker-controlled site. It also indicates that it's now sitting on a cache of stolen Lenovo e-mail messages.

More news...

Webinars

  • Security Alerts: Identifying Noise vs. Signals

    CIOs and CISOs invest millions of dollars to secure their organization and keep would-be attackers out of their networks. But despite these investments, determined attackers routinely breach...

  • PREMIUM MEMBER EXCLUSIVE

    Mobile: Fraud's New Frontier

    Mobile is quickly becoming the channel of choice for banking institutions and their customers, but the fraud risks are only starting to reveal themselves in the form of malware and account...

More webinars...

White Papers

  • M-Trends 2015: A View From the Front Lines

    Talking about the threat landscape is no substitute for experiencing it first-hand. "M-Trends 2015: A View from the Front Lines," distills the insights gleaned from hundreds of Mandiant incident...

  • Is It Phishing or an APT?

    Spear phishing is a primary means by which APTs target and infiltrate networks. This e-book describes the element of a phishing attack and how to keep your organization safe from advanced threats....

More whitepapers...
ARTICLE CISOs Frustrated by External Threats

Driven by the spectre of external threats, attacks and growing business expectations, can CISOs...

Latest Tweets and Mentions

ARTICLE CISOs Frustrated by External Threats

Driven by the spectre of external threats, attacks and growing business expectations, can CISOs...

The ISMG Network