Advertisement
Security
Subscribe to Security

The Lead

UPS Says Retail Stores Breached By Malware

August 21, 2014 9:46 am | by David Koenig, AP Business Writer | News | Comments

Some customers of The UPS Store may have had their credit and debit card information exposed by a computer virus found on systems at 51 stores in 24 states.                           

Protecting Data With Password Managers

August 18, 2014 1:09 pm | by CBS News | Videos | Comments

After a series of recent cyber-security breaches it's more important than ever to secure your...

5 Tips For Manufacturers To Protect Against IP Theft

August 18, 2014 12:33 pm | by Salo Fajer | Blogs | Comments

There’s no doubt that technology has made manufacturing easier, but it has also opened up...

Senator Calls For Surveillance Policy Shift

August 18, 2014 9:39 am | by Nigel Duara, Associated Press | News | Comments

A Oregon Senator called for updates to the rules by which intelligence agencies operate, and...

View Sample

FREE Email Newsletter

Daily news and top headlines for IT professionals

Survey: One In Five Mfg. Businesses Have Lost IP To Security Breaches

August 15, 2014 9:40 am | by Kaspersky Lab | News | Comments

According to a survey of businesses IT managers worldwide, 21 percent of manufacturers suffered a loss of intellectual property (IP) within the past year.                           

IP Network Architecture: Enhancing User-Access Security

August 11, 2014 12:11 pm | by Clark Case | Blogs | Comments

User-access security is critical to safeguard industrial operations, as well to protect the most valuable assets — including intellectual property.                             

Smartphones Must Include 'Kill Switch' Under Bill

August 8, 2014 9:17 am | by Fenit Nirappil, Associated Press | News | Comments

Under the bill, smartphones must be sold pre-equipped with a "kill switch" that deactivates them if stolen. Such technology is already widely available to download, but the legislation would make the shut-off function standard unless a customer opts out.

Advertisement

Spying Revelations Lead To German Encryption Boom

August 7, 2014 1:14 pm | by Martha Mendoza & Frank Jordans, Associated Press | News | Comments

Jon Callas, co-founder of Silent Circle, which sells an encryption app allowing users to talk and text in private, said a series of disclosures from former intelligence contractor Edward Snowden last year have been a boon for business.     

Russian Hackers Know Your Password

August 6, 2014 12:15 pm | by CNNMoney | Videos | Comments

How a security firm discovered the massive data breach, how to know if your information was compromised, and what to do to prevent further leaks.                              

Attackers Burn 4 Coca-Cola Trucks In Mexico

August 6, 2014 9:34 am | by The Associated Press | News | Comments

Unidentified attackers have burned four Coca-Cola Co. delivery trucks in an area of Mexico's southern state of Guerrero known for drug gang turf battles.                           

HP: Most IoT Devices Lack Security, Open To Attack

July 31, 2014 3:29 pm | by Jon Minnick, Associate Editor | Blogs | Comments

A recent study from Hewlett-Packard reveals that 70 percent of Internet of Things (IoT) devices — including sensors and connected infrastructure — are seriously vulnerable to attack.                   

Cloud Applications, A Challenge For Both User And Access Control

July 30, 2014 12:40 pm | by Dean Wiech | Articles | Comments

For an IT department, working with cloud applications and their providers can present a number of new challenges. Where the IT department previously took a facilitating role, it is now transitioning to a coordinating role. In addition, it can be significantly more difficult to control user and access privileges in cloud applications.

Advertisement

QuickBooks In The Cloud Computing Era: How Mobile Does Your Manufacturing Operation Want To Be?

July 14, 2014 11:50 am | by Adam Stern | Articles | Comments

While enabling a mobile workforce can raise concerns about security, data protection and integrity is typically greater with a hosted solution than with an in-house implementation.                    

Blackphone: The Smartphone With More Security

July 11, 2014 12:03 pm | by USA TODAY | Videos | Comments

The Blackphone offers a higher level of privacy than other smartphones. CEO Toby Weir-Jones explains some of the security-conscious features.                               

U.S., China Talk Cyberhacking Amid New Allegations

July 10, 2014 11:35 am | by Bradley Klapper & Louise Watt, Associated Press | News | Comments

Top American officials said Thursday they challenged their counterparts in China to rein in alleged cybersecurity infringements as a new allegation emerged of a brazen attempt by Chinese hackers to break into U.S. government personnel files.   

California Man Facing Prison For Economic Espionage

July 10, 2014 9:49 am | by The Associated Press | News | Comments

A Northern California chemical engineer is facing more than 20 years in prison for a rare economic-espionage conviction for selling to China the technology that creates a white pigment.                   

Using Google Glass To Steal Passwords

July 8, 2014 12:28 pm | by CNNMoney | Videos | Comments

Cyber forensics experts have developed a way to to steal passwords entered on a smartphone or tablet using Google Glass and other recording devices.                             

Advertisement

Germany's Merkel Slams Industrial Spying During China Visit

July 7, 2014 9:54 am | by The Associated Press | News | Comments

German Chancellor Angela Merkel criticized industrial spying Monday while on a visit to China, which Germany and other governments have cited as a global center for economic espionage.                   

Privacy Board Says NSA's Internet Monitoring Is Legal

July 2, 2014 12:42 pm | by Ken Dilanian, AP Intelligence Writer | News | Comments

The National Security Agency programs that collect huge volumes of Internet data within the United States are constitutional and employ "reasonable" safeguards designed to protect the rights of Americans, an independent privacy and civil liberties board has found.

U.S. Wants To Resume Cyber Talks With China

June 27, 2014 11:53 am | by Matthew Pennington, Associated Press | News | Comments

The United States wants to restart a cybersecurity working group that China shut down after the U.S. indicted five Chinese military officers on charges of hacking into American companies' computers to steal trade secrets.         

T1red Of P@sswords? Y0u @re N*t @lone!

June 27, 2014 11:48 am | by Martha Irvine, AP National Writer | Articles | Comments

Trying to remember the growing list of letter-number-and-symbol passwords created to access various online accounts can be a headache. But you're not the only one with this problem.                   

Data Shows iPhone 'Kill Switch' Cuts Thefts

June 19, 2014 4:12 pm | by Michael Virtanen, Associated Press | News | Comments

New crime data show Apple's addition of a "kill switch" to its iPhones last September has sharply reduced robberies and thefts, authorities said Thursday.                           

Tech Giants Want To Halt Overseas Snooping By U.S.

June 17, 2014 9:57 am | by Larry Neumeister, Associated Press | News | Comments

Microsoft Corp. and four other large American technology companies are using a Manhattan court case to draw a line in the cloud, saying the U.S. government has no right to seize computer data stored outside the country.         

Online Secrets Revealed With Insecure Public Wi-Fi

June 16, 2014 12:22 pm | by CNNMoney | Videos | Comments

Stalker is a tool created by security researchers to show companies and individuals all the information they share when they connect to insecure public Wi-Fi.                          

Little Public Action In China Cyberspying Case

June 3, 2014 1:09 pm | by Eileen Sullivan and Eric Tucker, Associated Press | News | Comments

The accused have yet to be placed on Interpol's public listing of international fugitives, and there is no evidence that China would even entertain a formal request by the U.S. to extradite them.               

Cell Phone Metadata Reveals More Than You Think

June 2, 2014 1:13 pm | by CBS News | Videos | Comments

When the NSA surveillance program was exposed, the government said they didn't listen to calls, and only collected metadata. But that metadata can actually reveal personal information.                 

Cyber Threats: Hiding, Targeting Valuable Assets

June 2, 2014 1:00 pm | by Nina Vajda | Articles | Comments

The threat that cyberattacks pose to manufacturers can be seen in the plethora of counterfeit products that flood the global marketplace every year. Manufacturing companies must accept that if their product has value, it’s a target for cyber criminals.

Could Passwords Soon Be A Thing Of The Past?

May 28, 2014 1:15 pm | by CBS News | Videos | Comments

Despite a series of recent data compromises, many still use easy-to-remember combinations, which are easy to steal. Thumbprints and eye scanners have been tried as alternatives, but with little success. One Chicago company charges customers to use military-grade encryption that safeguards passwords to personal data.

Batten Down The Hatches, We’re Under (Cyber)Attack

May 28, 2014 12:51 pm | by Jon Minnick, Associate Editor | Blogs | Comments

The 12th annual survey of cybercrime trends found that online attackers determined to break into computers, steal information and interfere with business are more technologically advanced than those trying to stop them.         

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading