1. Articles in category: Cyber Security

    1-24 of 147 1 2 3 4 5 6 7 »
    1. The massive, worldwide ransomware attack was stopped by a researcher ‘accidentally’

      Organizations across the globe, including hospitals, telecom firms and automakers in Europe, were dealing with a massive cyber attack Friday that locked people out of their computers.

      The malicious software, known as ransomware, demanded money in exchange for unlocking the computer systems, and thus giving people access to their data.

      Luckily, a young British security researcher stopped the attack Friday night — by accident.

      Read Full Article
    2. Google phishing attack was foretold by researchers—and it may have used their code

      The "Google Docs" phishing attack that wormed its way through thousands of e-mail inboxes earlier this week exploited a threat that had been flagged earlier by at least three security researchers—one raised issues about the threat as early as October of 2011. In fact, the person or persons behind the attack may have copied the technique from a proof of concept posted by one security researcher to GitHub in February.

      Read Full Article
    3. Why you should worry about API security, but not panic

      API security has gathered significant attention recently. Since APIs by definition govern access to important data, any concerns about data security lead inevitably to questions about API security. This focus will continue to become increasingly top of mind as more APIs are created, published and used in the growing API-first world. However, there is reason for optimism. With a thoughtful planning approach, with follow-through and detailed execution, companies can have a successful API security policy.

       

      Read Full Article
    4. How to fend off cyberattacks and data breaches

      According to research conducted by Symantec, the number of cyberattacks against small businesses (companies with fewer than 250 employees) has been steadily growing over the last six years, with hackers specifically targeting employees (phishing). And while distributed denial of service, or DDoS, attacks are still a leading form of cyber warfare, ransomware and malware attacks, targeting users of smartphones and internet of things (IoT) devices, as well as PCs and systems running on Macs and Linux, are also a big threat to small businesses.

       

      Read Full Article
    5. 9 biggest information security threats through 2019

      The information security threat landscape is constantly evolving. To help you navigate the terrain, each year the Information Security Forum (ISF) — a nonprofit association that researches and analyzes security and risk management issues on behalf of its members — puts out its Threat Horizon report to provide members with a forward-looking view of the biggest security threats over a two-year period.

      Read Full Article
    6. How ISPs can sell your Web history—and how to stop them

      The US Senate yesterday voted to eliminate privacy rules that would have forced ISPs to get your consent before selling Web browsing history and app usage history to advertisers. Within a week, the House of Representatives could follow suit, and the rules approved by the Federal Communications Commission last year would be eliminated by Congress. So what has changed for Internet users? In one sense, nothing changed this week, because the requirement to obtain customer consent before sharing or selling data is not scheduled to take effect until at least December 4, 2017.

      Read Full Article
    7. IT leaders say it's hard to keep the cloud safe

      IT managers are finding it difficult to keep their applications and data safe in the cloud, and many are slowing cloud adoption because of it. That was one of the findings of an Intel cloud security report that surveyed 2,000 IT professionals in different countries and industries last fall. The issue isn't with the cloud itself, since trust outnumbers distrust for public clouds by more than two to one, according to Intel's survey.

      Read Full Article
    8. IT and C-level leaders point fingers at each other over cyber defense

      IT managers disagree with chief executives over who is responsible for a cyber security breach, according to a survey released Thursday. The survey -- of a group of 221 chief executive officers and other C-level executives and another group of 984 IT decision makers -- found that each group largely believes the other group is responsible in the event of a breach. IT managers say a cyber attack will cost double what their bosses estimate.

      Read Full Article
    9. Outsourcing trends to watch in 2017

      This year, we saw outsourcing integration challenges multiply, production workloads and enterprise systems hit the cloud, and security hit the top of the agenda. So what’s ahead for 2017? Uncertainty for one thing. Industry watchers expect a number of shifts in the IT and business process services space — not least of which will be the initiation of more flexible outsourcing terms as the world watches and waits to see what happens once president elect Donald Trump takes office and Brexit takes hold.

       

      Read Full Article
    10. How a dose of AI could be the cure for hospital EHR cyberattacks in 2017

      I know how terrible hospital record theft can be. I myself have been the victim of a data theft by hackers who stole my deceased father’s medical files, running up more than $300,000 in false charges. I am still disputing on-going bills that have been accruing for the last 15 years. This event led me on the path to finding a solution so others would not suffer the consequences that I continue to be impacted by, but hospitals and other healthcare providers must be willing to make the change.

      Read Full Article
    11. Yahoo sets hack record at 1 billion accounts

      A new breach revealed Wednesday by the troubled internet pioneer compromised twice as many user accounts as the record hack it disclosed in September. The hack occurred in August 2013. Stolen data included users' names, email addresses, telephone numbers, dates of birth, and encrypted passwords. Those passwords are scrambled up with an encryption tool called MD5, which experts say is possible to crack with some patience. The data also included some security questions and answers, some of which weren't encrypted.

      Read Full Article
    12. Our Continuously Connected Lives: What’s Your ‘App’-titude?

      With the continued evolution of IoT devices and the rapid pace of software innovation, everyone needs to change their ‘app’-titude around security. One of the most important themes for National Cyber Security Awareness aims to bring security to front of mind for both application developers and security practitioners who need to be more consistent with updates and patches. As business leaders, you are not only modeling best security practices for end users, but you also need to demand that developers change their attitudes about application security.

      Read Full Article
    1-24 of 147 1 2 3 4 5 6 7 »
  1. Popular Articles