A British/American intelligence team hacked Gemalto - the world's largest SIM manufacturer - and stole encryption keys that can be used to intercept and eavesdrop on cellular communication, according to a news report citing leaked documents.
Cybercrime is on the rise. To combat it, GTU is launching e-Raksha Research Centre - a public private partnership initiative. The spin-off is also aimed at growing the capacity of InfoSec professionals.
Lenovo - the world's largest PC manufacturer - says it will cease pre-installing Superfish adware on its devices and help customers delete the software and its risky digital certificate. But will all affected users get the message?
Under Jeremy Grant's stewardship, the National Strategy for Trusted Identities in Cyberspace has awarded some $30 million in grants to organizations to develop and test new, secure and easily employed ways for consumers to conduct transactions online.
Better DNS security could help block some types of spoofing, poisoning and DDoS attacks. But the DNSSEC approach has its critics, and it wouldn't improve Internet security overnight.
The Hong Kong regional headquarters of (ISC)² is collaborating with universities across Asia through its Global Academic Program to deliver essential skills to help grow the information security workforce.
Attacks are larger, adversaries more diverse, and damage is broader. These are characteristics of today's DDoS attacks, and organizations need a new approach to protection, says Verisign's Ramakant Pandrangi.
Is your organization running its anti-malware defenses properly? Don't be so sure. A new study finds that essential features built into anti-virus software are not always being used. From an information security standpoint, that's a serious problem.
Elayne Starkey, the state of Delaware's chief security officer, no longer micromanages how cloud services providers secure state data. Find out why she's giving providers more leeway in defining security requirements.
Target is the high-profile example, but many organizations have been breached through third-party vulnerabilities. Where are the security gaps, and how can they be filled? BitSight's Stephen Boyer offers insight.
A team of hackers has been operating since at least 2001, wielding malware that even today is among the most advanced attack code to have ever been discovered, according to a new study. Security experts are debating whether the NSA could be involved.
As cybercrime grows, Section 66A of India's IT Act is under scrutiny of the court, government and security leaders. Some experts say it requires amendments to ensure correct interpretation and implementation.
Despite commitments by leading payment card brands to enhance security, some critics say the White House cybersecurity summit produced no specifics for how the public and private sectors will curb cyber-fraud.
The Anunak/Carbanak gang continues to rob financial services firms and retailers, in part with ATM malware. A new report says the cybercrime gang has stolen up to $1 billion from banks in Russia, the U.S. and beyond.
Europe's vaunted data protection regulations - now 20 years old - are in desperate need of an update. In 2012, EU officials proposed extensive changes to the privacy rules, but they remain stuck in limbo. Here's why.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.