Venkat is special correspondent for Information Security Media Group's global news desk. She has previously worked at companies such as IDG and Business Standard where she reported on developments in technology, businesses, startups, fintech, e-commerce, cybersecurity, civic news and education.
U.S. Sen. Kirsten Gillibrand, D-N.Y., is proposing the creation of a new federal agency dedicated to protecting online privacy, taking that task away from the Federal Trade Commission.
Cybercrime led to $3.5 billion in losses in the U.S. last year, with a sharp uptick in business email compromise scams - which accounted for nearly half those losses, according to a newly released FBI Internet Crime Report, which is based on complaints the FBI received.
A bipartisan group of eight U.S. senators is urging National Security Adviser Robert O'Brien to appoint a special coordinator to oversee the rollout of 5G cellular networks. The coordinator would address security issues and coordinate the efforts of federal agencies.
Democratic members of the House Energy and Commerce Committee have sent a letter to the Federal Communications Commission demanding that it do more to enforce the Communications Act following a report about wireless carriers giving phone data to third parties.
Nearly four months after Capital One revealed a massive data breach, Michael Johnson, the bank's CISO, is being moved into an outside advisory role, and the company is scouting for a new security leader, according to the Wall Street Journal.
U.S. Senator Ron Wyden is pushing the Federal Communications Commission to ensure that wireless carriers build new security measures, such as encryption and authentication, into 5G networks as they're rolled out over the next several years.
Alleged Capital One hacker Paige A. Thompson has been released from prison and will stay in a halfway house until her trial in federal court next year. Prosecutors allege that Thompson stole over 100 million records from the bank earlier this year.
Business email compromise scams continue to proliferate. Last week, Japanese media company Nikkei revealed that an employee made a $29 million fraudulent transfer as a result of a scam. And in a separate scam, the city of Ocala, Florida, suffered losses of over $742,000.
A new phishing campaign lures employees with a message about a salary increase, according to researchers at the security firm Cofense. The campaign is designed to harvest Office 365 credentials.
Elizabeth Denham, the U.K.'s chief privacy watchdog, is urging police to go slow when it comes to using live facial recognition. She also calls on the government to create a statutory code of practice for police use of the technology.
FCC Chairman Ajit Pai is pushing a proposal that would ban U.S. telecommunications firms from using commission funds to buy equipment from companies deemed national security threats. The new rule would first target Chinese telecom companies Huawei and ZTE.
Some 42 apps that were available in the Google Play store had been delivering adware to Android devices for about a year, according to the security firm ESET. In the 12-month period starting in July 2018, these apps were downloaded about 8 million times to Android devices around the world, the researchers say.
Spanish authorities say they've arrested three individuals on charges of running a large-scale business email compromise scheme that targeted a dozen companies around the world to steal about $11 million.
A Texas resident has been sentenced to 12 years in federal prison for hacking into the Los Angeles Superior Court computer system and sending out approximately 2 million phishing emails to steal hundreds of credit and payment card numbers.
Facebook has removed four networks - three from Iran and one from Russia - after its investigation revealed they were spreading misinformation regarding politics and news related to the 2020 U.S. presidential election. The action is part of a larger effort by the social media firm to clamp down on abuse.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.