Some security experts contend that users of numerous types of Lenovo PCs and laptops are at risk of having their encrypted traffic get intercepted because of installed-by-default Superfish adware, which handles digital certificates insecurely.
On the heels of the FFIEC's new business continuity guidelines, Deputy Comptroller Beth Dugan hints that new guidance related to cybersecurity risks affecting payments and mobile transactions may be coming.
As a result of the explosive growth in worldwide use of smart phones, mobile malware will play a much bigger role in fraud this year, predicts Daniel Cohen, a threat researcher for RSA, which just released its 2014 Cybercrime Roundup report.
As the use of consumer health devices and applications grows, so do privacy and security concerns, says a new Federal Trade Commission report. Learn about the precautions the FTC recommends.
Because of employees' increasing demands to use mobile devices at work, NIST's latest special publication provides organizations with a process to implement a mobile app vetting process.
The Federal Reserve on Jan. 26 revealed its roadmap for an overhaul of the U.S. payments system, which includes plans for faster settlement and a focus on improving payments security to reduce fraud.
Information security experts are calling on Google to rethink its patch priorities after it declines to fix a critical component that runs on Android 4.3 "Jelly Bean" and older devices, leaving an estimated 930 million mobile devices at risk.
A comprehensive report from just-retired Sen. Tom Coburn on shortcomings at DHS in implementing government cybersecurity policies serves as a primer for the new GOP majority in the Senate in conducting Homeland Security oversight.
Consider President Obama's signing of the Federal Information Security Modernization Act this month an early birthday present for Sen. Tom Carper, the chief sponsor of the legislation that updates FISMA.
As NIST launches an effort to address cyber risks concerning medical devices, security experts weigh in on whether the latest initiative will spur the change needed to protect such devices.
The response by Sony Pictures Entertainment executives to the hack attack against their company provides a number of great examples for how to not to handle a data breach. Here are 7 key mistakes they made.
A flash drive holding sensitive customer data was lost after a routine audit with federal examiners. Now experts are left wondering: How could such an egregious breach happen?
Users' fear of data loss on personal devices must be balanced with an organization's need to protect sensitive information, says ZixCorp's Nigel Johnson. He explains the evolution of mobile device management.
Financial transactions on smart phones require layered security that helps outsmart cyberthieves, says Alan Dabbiere, chairman of AirWatch, who describes today's mobile challenges.
Lost and stolen mobile devices might be a leading cause of data breaches. But it's a strategic mistake for enterprises to focus too heavily on device security, says Christy Wyatt, CEO of Good Technology.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.