Advertisement
Security
Subscribe to Security

The Lead

New Pentagon Strategy Warns Of Cyberwar Capabilities

April 23, 2015 10:31 am | by Lolita C. Baldor, Associated Press | News | Comments

A new Pentagon cybersecurity strategy lays out for the first time publicly that the U.S. military plans to use cyberwarfare as an option in conflicts with enemies.

Computer Security Has ‘Failed,’ Tech Expert Says

April 22, 2015 11:57 am | by USA TODAY | Videos | Comments

Breaches and attacks have gotten worse and will continue to get worse until the computer...

Verizon Report Shows 'Sizable Gaps' In Cybersecurity Measures

April 16, 2015 9:57 am | by Andy Szal, Digital Reporter | News | Comments

Organizations continue to exhibit "sizable gaps" in their cybersecurity protocol, according to...

Can Cybercriminals Exploit IoT?

April 13, 2015 11:42 am | by Wall Street Journal | Videos | Comments

Cybercriminals will exploit vulnerabilities in new technology as they figure out how to make...

View Sample

FREE Email Newsletter

Daily news and top headlines for IT professionals

Cybersecurity: The Ongoing Situation

April 9, 2015 12:34 pm | by Jon Minnick, Associate Editor | Videos | Comments

In this day and age, due to such aggressive attacks by hackers, every company should assume that they have been or will be hacked. Activate founder Michael Wolf discusses cybersecurity in the wake of the Heartbleed bug and recent company hack attacks. 

Cybercrime Fighting Group Takes Down Beebone Botnet

April 9, 2015 10:17 am | by Raphael Satter, Associated Press | News | Comments

A new group of international cybercrime fighters claimed one of its first kills Thursday, pulling the plug on malicious servers that hijacked at least 12,000 machines, most of them in the United States.

AT&T Paying $25M To Settle U.S. Action Over Data Breaches

April 9, 2015 10:08 am | by Marcy Gordon, AP Business Writer | News | Comments

AT&T is paying $25 million in a settlement with federal regulators over data breaches at call centers.

Advertisement

Obama Signs Order Creating New Cyber Sanctions Program

April 2, 2015 10:20 am | by Ken Dilanian, AP Intelligence Writer | News | Comments

President Barack Obama on Wednesday authorized a new U.S. government approach to deterring cyberattacks: financial sanctions against malicious overseas hackers and companies that knowingly benefit from the fruits of cyberespionage.

Study: Manufacturers Should Upgrade Risk Management Practices

March 31, 2015 10:25 am | by Andy Szal, Digital Reporter | News | Comments

A new report from Deloitte and the Manufacturers Alliance for Productivity and Innovation recommends that manufacturers convert their risk management practices to "an ongoing conversation rather than a periodic presentation."

5 Tips To Catch A Hacker

March 27, 2015 11:35 am | by Jon Minnick, Associate Editor | Blogs | Comments

Tech expert and Chief Technology Officer at SRV Network, Inc., Karl Volkman, returns to give his tips for catching a hacker. 

New Alternatives To Computer Passwords

March 25, 2015 11:52 am | by CBS News | Videos | Comments

Forget about forgetting passwords — Yahoo has introduced a system for sending single-use passwords on demand to mobile phone users, while Microsoft is proposing "biometric authentication,” in which your computer must recognize your face, iris or fingerprint to grant you access

IT & OT Turn To Physical Security For Productivity

March 19, 2015 11:29 am | by Greg Varga & Bob Voss | Articles | Comments

Tapping the full potential of smart, connected devices hinges on having physical security and access-control technologies and processes capable of protecting the new streams of industrial data. 

Advertisement

At Odds With Google, U.S. Seeks New Rule On Computer Access

March 13, 2015 9:47 am | by Eric Tucker, The Associated Press | News | Comments

The Justice Department is at odds with Google and privacy groups over the government's push to make it easier to locate and hack into computers in criminal investigations, a simmering conflict with constitutional and policy implications.

Will The Apple Watch Give Hackers Another Way In?

March 12, 2015 11:38 am | by Bloomberg Business | Videos | Comments

Pkware CEO Miller Newton discusses Apple Watch security features. 

Apple, Android Browsers Vulnerable To 'FREAK Attack'

March 4, 2015 9:56 am | by Brandon Bailey, AP Technology Writer | News | Comments

Millions of people may have been left vulnerable to hackers while surfing the web on Apple and Google devices, thanks to a newly discovered security flaw known as "FREAK attack."

Securing Your Smartphone

March 2, 2015 11:58 am | by Bloomberg Business | Videos | Comments

Gary Kovacs discusses the importance of securing your smartphone.

FCC Backs Net Neutrality

February 27, 2015 9:52 am | by Andy Szal, Digital Reporter | News | Comments

The Federal Communications Commission voted Thursday to protect so-called "net neutrality" by establishing uniform standards for those using the Internet.

Advertisement

Goldman CEO On Hacking: 'Certainty Is Unavailable'

February 26, 2015 12:40 pm | by CNN Money | Videos | Comments

Goldman Sachs CEO Lloyd Blankfein says securing the bank's technology is "anxiety producing" and that "it would be foolish to make claims of perfection" because "the reliance on technology is one of the biggest risks we all have."

Why Manufacturers Need To Do Their Duty To Protect Core Applications

February 24, 2015 11:17 am | by Mariano Nunez | Articles | Comments

In 2014, organizations were caught off guard by the increase in advanced threats targeting vulnerabilities within business-critical applications. In order to ensure that this information is secured, manufacturing organizations must implement measures that eliminate any and all threats to the business before they evolve.

Superfish Points Fingers Over Ad Software Security Flaws

February 23, 2015 10:31 am | by Brandon Bailey, AP Technology Writer | News | Comments

 A little-known Silicon Valley startup was caught in a firestorm of criticism this week for making software that exposed Lenovo laptop users to hackers bent on stealing personal information. But Superfish Inc. has also won praise for producing visual search technology that many see as the next big thing in online shopping.

Lenovo Shipped Laptops With Security Flaw, Experts Say

February 20, 2015 9:37 am | by Brandon Bailey, AP Technology Writer | News | Comments

Experts say the world's biggest computer maker shipped laptops with pre-installed software that could let hackers steal passwords or other sensitive information when you use the web to shop, pay bills or check email.

U.S. Army Launches Giant Blimp To Test Air Defense

February 19, 2015 11:20 am | by CBS News | Videos | Comments

It's not a bird or a plane, but a blimp in the sky, floating over Maryland's Baltimore suburbs. It's the newest security system launched by the Army to protect major cities along the East Coast, and it can detect everything from a cruise missile to a large drone.

Manufacturing Group Backs Overseas Email Privacy Bill

February 13, 2015 11:56 am | by Andrew Szal, Digital Reporter, Manufacturing Business Technology | News | Comments

A national manufacturing group is calling for congressional passage of an overseas email privacy bill, arguing it would help protect American business relationships abroad.

Obama To Focus On Cybersecurity In Heart Of Silicon Valley

February 13, 2015 11:17 am | by Darlene Superville and Martha Mendoza, The Associated Press | News | Comments

Responding to unprecedented data breaches and cyberattacks, President Barack Obama is trying to spark alliances between policymakers who want to regulate the online world and tech innovators who traditionally shun Beltway bureaucracies.

Are You A Hack Waiting To Happen? Your Boss Wants To Know

February 12, 2015 11:10 am | by Barbara Ortutay, AP Technology Writer | News | Comments

A growing number of companies, including Twitter Inc., are giving their workers' a pop quiz, testing security savvy by sending spoof phishing emails to see who bites.

Sansa Security Joins The Industrial Internet Consortium

February 11, 2015 10:52 am | by Sansa Security | News | Comments

Sansa Security, a provider of embedded security technologies, today announced that it has joined the Industrial Internet Consortium (IIC) in the hopes of accelerating the growth of the industrial Internet and Internet of Things (IoT) technologies.

New Agency Designed To Fight Cyber Threats

February 10, 2015 12:12 pm | by Jon Minnick, Associate Editor | Blogs | Comments

Today, the White House will announce the creation of a new agency named the Cyber Threat Intelligence Integration Center (CTIIC) — which will be tasked with thwarting cyberattacks by sharing intelligence across other agencies in the event of a crisis.

Let Hackers In: Experts Say Traps Might Be Better Than Walls

February 10, 2015 9:43 am | by Youkyung Lee, AP Technology Writer | News | Comments

Ever since the Internet blossomed in the 1990s, cybersecurity was built on the idea that computers could be protected by a digital quarantine. Now, as hackers routinely overwhelm such defenses, experts say cybersecurity is beyond due an overhaul. 

Smart TV Innovations Creating Privacy Concerns

February 9, 2015 11:28 am | by CBS News | Videos | Comments

TV technology, like Samsung's SmartTV, enables televisions to act on voice commands, but the TV sets can capture other words you say and transmit them to third parties. That's raising concerns about privacy.             

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading