Advertisement
Security
Subscribe to Security

The Lead

QuickBooks In The Cloud Computing Era: How Mobile Does Your Manufacturing Operation Want To Be?

July 14, 2014 11:50 am | by Adam Stern | Articles | Comments

While enabling a mobile workforce can raise concerns about security, data protection and integrity is typically greater with a hosted solution than with an in-house implementation.                    

Blackphone: The Smartphone With More Security

July 11, 2014 12:03 pm | by USA TODAY | Videos | Comments

The Blackphone offers a higher level of privacy than other smartphones. CEO Toby Weir-Jones...

U.S., China Talk Cyberhacking Amid New Allegations

July 10, 2014 11:35 am | by Bradley Klapper & Louise Watt, Associated Press | News | Comments

Top American officials said Thursday they challenged their counterparts in China to rein in...

California Man Facing Prison For Economic Espionage

July 10, 2014 9:49 am | by The Associated Press | News | Comments

A Northern California chemical engineer is facing more than 20 years in prison for a rare...

View Sample

FREE Email Newsletter

Daily news and top headlines for IT professionals

Using Google Glass To Steal Passwords

July 8, 2014 12:28 pm | by CNNMoney | Videos | Comments

Cyber forensics experts have developed a way to to steal passwords entered on a smartphone or tablet using Google Glass and other recording devices.                             

Germany's Merkel Slams Industrial Spying During China Visit

July 7, 2014 9:54 am | by The Associated Press | News | Comments

German Chancellor Angela Merkel criticized industrial spying Monday while on a visit to China, which Germany and other governments have cited as a global center for economic espionage.                   

Privacy Board Says NSA's Internet Monitoring Is Legal

July 2, 2014 12:42 pm | by Ken Dilanian, AP Intelligence Writer | News | Comments

The National Security Agency programs that collect huge volumes of Internet data within the United States are constitutional and employ "reasonable" safeguards designed to protect the rights of Americans, an independent privacy and civil liberties board has found.

Advertisement

U.S. Wants To Resume Cyber Talks With China

June 27, 2014 11:53 am | by Matthew Pennington, Associated Press | News | Comments

The United States wants to restart a cybersecurity working group that China shut down after the U.S. indicted five Chinese military officers on charges of hacking into American companies' computers to steal trade secrets.         

T1red Of P@sswords? Y0u @re N*t @lone!

June 27, 2014 11:48 am | by Martha Irvine, AP National Writer | Articles | Comments

Trying to remember the growing list of letter-number-and-symbol passwords created to access various online accounts can be a headache. But you're not the only one with this problem.                   

Data Shows iPhone 'Kill Switch' Cuts Thefts

June 19, 2014 4:12 pm | by Michael Virtanen, Associated Press | News | Comments

New crime data show Apple's addition of a "kill switch" to its iPhones last September has sharply reduced robberies and thefts, authorities said Thursday.                           

Tech Giants Want To Halt Overseas Snooping By U.S.

June 17, 2014 9:57 am | by Larry Neumeister, Associated Press | News | Comments

Microsoft Corp. and four other large American technology companies are using a Manhattan court case to draw a line in the cloud, saying the U.S. government has no right to seize computer data stored outside the country.         

Online Secrets Revealed With Insecure Public Wi-Fi

June 16, 2014 12:22 pm | by CNNMoney | Videos | Comments

Stalker is a tool created by security researchers to show companies and individuals all the information they share when they connect to insecure public Wi-Fi.                          

Advertisement

Little Public Action In China Cyberspying Case

June 3, 2014 1:09 pm | by Eileen Sullivan and Eric Tucker, Associated Press | News | Comments

The accused have yet to be placed on Interpol's public listing of international fugitives, and there is no evidence that China would even entertain a formal request by the U.S. to extradite them.               

Cell Phone Metadata Reveals More Than You Think

June 2, 2014 1:13 pm | by CBS News | Videos | Comments

When the NSA surveillance program was exposed, the government said they didn't listen to calls, and only collected metadata. But that metadata can actually reveal personal information.                 

Cyber Threats: Hiding, Targeting Valuable Assets

June 2, 2014 1:00 pm | by Nina Vajda | Articles | Comments

The threat that cyberattacks pose to manufacturers can be seen in the plethora of counterfeit products that flood the global marketplace every year. Manufacturing companies must accept that if their product has value, it’s a target for cyber criminals.

Could Passwords Soon Be A Thing Of The Past?

May 28, 2014 1:15 pm | by CBS News | Videos | Comments

Despite a series of recent data compromises, many still use easy-to-remember combinations, which are easy to steal. Thumbprints and eye scanners have been tried as alternatives, but with little success. One Chicago company charges customers to use military-grade encryption that safeguards passwords to personal data.

Batten Down The Hatches, We’re Under (Cyber)Attack

May 28, 2014 12:51 pm | by Jon Minnick, Associate Editor | Blogs | Comments

The 12th annual survey of cybercrime trends found that online attackers determined to break into computers, steal information and interfere with business are more technologically advanced than those trying to stop them.         

Advertisement

Handling Incident Response: Assume The Fetal Position

May 28, 2014 12:39 pm | by Jeff Multz | Articles | Comments

A Computer Security Incident Response Plan, or CSIRP, is the plan you turn to when the enemy strikes and you realize you’ve been hit. At that point, there’s no time to wonder, “What do we do now?” With a well-conceived, well-rehearsed CSIRP, everyone involved in the plan will know exactly what to do.

Survey Finds Cybercrime On The Rise

May 28, 2014 9:37 am | by Martha Mendoza, AP National Writer | News | Comments

The hackers are winning, according to a survey of 500 executives of U.S. businesses, law enforcement services and government agencies released Wednesday.                           

China To Step Up Scrutiny Of Internet Products And Services

May 22, 2014 12:52 pm | by Joe McDonald, AP Business Writer | News | Comments

China's government announced Thursday it will examine information technology for possible security flaws, a move that comes amid tensions with Washington over accusations of cyber spying.                  

Alcoa Employee Arrested In $1M Fraud Case

May 21, 2014 12:47 pm | by The Associated Press | News | Comments

An Alcoa machine shop worker in Texas has been arrested in what prosecutors call a $1 million scam to order, steal and then resell equipment.                               

China Warns Cyber Charges Could Damage Ties

May 20, 2014 1:52 pm | by Joe McDonald, Associated Press | News | Comments

China on Tuesday warned the United States was jeopardizing military ties by charging five Chinese officers with cyberspying and tried to turn the tables on Washington by calling it "the biggest attacker of China's cyberspace."       

Behind The Scenes: How FBI Made Global Hacker Bust

May 20, 2014 1:45 pm | by CNNMoney | Videos | Comments

CNN gains exclusive access to the FBI as it takes down cyber criminals infecting 700,000 victims' computers.                                         

U.S. Government Cites China In Cyberspying Case

May 19, 2014 1:15 pm | by Eric Tucker, Associated Press | News | Comments

The United States has brought first-of-its kind cyber-espionage charges against five Chinese military officials accused of hacking into U.S. companies to gain trade secrets.                      

Minnesota Enacts 1st Law On Smartphone Disabling

May 15, 2014 9:41 am | by The Associated Press | News | Comments

Minnesota enacted the nation's first law Wednesday requiring smartphones and tablets sold in the state to have a remote shut-off feature as a way to deter theft.                         

Ex-Nissan Worker Accused Of Illegally Accessing Company Data

May 13, 2014 9:47 am | by The Associated Press | News | Comments

A former employee of Nissan Motor Co. was arrested Tuesday on suspicion of illegally acquiring company trade secrets, police said.                                   

Security In Manufacturing: Verizon's 2014 Data Breach Investigations Report Highlights

May 8, 2014 12:02 pm | by Kimberly Knickle, IDC Manufacturing Insights | Blogs | Comments

In the report, Verizon calls 2013 a year of transition from geopolitical attacks to large-scale attacks on payment card systems. While that sounds like good news for manufacturers, it's only mildly comforting.           

San Francisco Supervisor Proposes City Kill Switch Law

May 7, 2014 12:41 pm | by Terry Collins, Associated Press | News | Comments

A San Francisco supervisor proposed legislation Tuesday requiring smartphones and other mobile devices sold in the city to be equipped with a "kill switch" to render them inoperable if they're lost or stolen.            

Smart Gun Technology Sparks Outrage

May 7, 2014 12:27 pm | by CBS News | Videos | Comments

A new weapon called the smart gun uses computer technology to prevent anyone other than the gun's owner from shooting, but one gun store received backlash after planning to sell the firearm.                 

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading