Android M will give app users a lot better control over their data privacy
#google unveiled the developer preview of the next version of #android at its annual I/O developer conference last week, and there’s a big difference from previous versions in how it will handle user...
View ArticleIoT devices entering enterprises, opening company networks to attacks
OpenDNS released The 2015 Internet of Things in the Enterprise Report, a worldwide data-driven security assessment of Internet of Things (IoT) devices and infrastructure found in businesses. Using...
View ArticleData Breach Costs Hit Record $3.8 Million Each, and Counting
The average cost for each lost or stolen record containing sensitive and confidential information increased from $145 in 2014 to $154 in this year’s study. Some 47% of all breaches were caused by...
View ArticleCloud-based solutions that protect against zero day attacks
BAE Systems Applied Intelligence announced at Infosecurity Europe 2015 that it is bringing cloud-based cyber security to commercial organisations in Europe for the first time. The company is...
View ArticleShadow IT is prevalent in government agencies
Despite clear benefits of #cloud services – greater collaboration, agility, and cost savings – federal agencies are slow to migrate to the cloud due to #security concerns. As a result, employees adopt...
View ArticleBusinesses ill-prepared to defend against dramatic rise in zero day attacks
Businesses have been diligently working to defend against attacks and exploits for years. The problem is that much of the conventional wisdom about #security is reactive and most of the security tools...
View ArticleBetter data loss prevention tools for OneDrive for Business
When most of us think about #data #loss in the enterprise, we think about deliberate acts of criminal theft. The pilfering of account information from the United States Internal Revenue Service by a...
View Article70% of breaches are detected by a third-party
46 percent of organizations that have suffered a data breach took more than four months to detect a problem, and more than three months to mitigate the risk. Worryingly, the survey of 1,000 IT...
View ArticleChina Overtakes US as Top Source of Distributed Denial of Service Attacks
More Distributed Denial of Service (#ddos) #attacks originated in China than in any other country, followed by Germany and the United States, according to the Q1 2015 State of the Internet – #security...
View ArticleLogjam TLS vulnerability is academic, not catastrophic
Logjam is a new weakness in TLS that allows an attacker to downgrade the cryptography on a connection; it is similar to another recent #attack on TLS calledFREAK. To help us understand why widespread...
View ArticleMost vulnerabilities on enterprise networks are two years old
The NTT Innovation Institute and NTT Group security combined an analysis of over six billion attacks observed in 2014 with an interactive data review and ongoing daily global threat visualization....
View ArticleSecurity News This Week: Macs Can Get Hacked, and So Can Personal Federal Data
So many hacks, so few days in the week to write alarming stories about every one. Every weekend, WIRED #security rounds up the security #vulnerabilities and #privacy updates that didn’t quite rise to...
View ArticleOPM Hack May Have Exposed Security Clearance Data
Twenty-four hours after unnamed White House officials said the Office of Personnel Management (OPM) #data #breach was linked to China, one #security company has connected the intrusion to the massive...
View ArticleFacebook, Twitter represent bulk of blocked traffic on corporate networks
CIOs and IT managers are in many ways fighting a losing battle when it comes to blocking employee access to #social media services and other websites on corporate networks. Every day, employee make an...
View ArticleSwift adoption of cloud and mobile drives insider threats
Bitglass surveyed 500 IT and #security practitioners and found that 62 percent have seen an increase in insider threats over the last 12 months. As more #data leaves the network via #cloud apps and...
View ArticleVMware patches virtual machine escape issue on Windows
VMware has released security updates for several of its virtualization products in order to address critical vulnerabilities that could allow attackers to break out of #virtual machines and execute...
View ArticleThe Duqu attack on Kaspersky Lab is a shocking assault on the whole security...
Russian security firm #kaspersky Lab today hosted a dramatic press conference that all but accused the US of carrying out a successful cyber-attack on the company using an obscure but extremely...
View ArticlePrivate security clearance info accessed in second OPM breach
Hackers tied to China may have accessed private security clearance information in what is being seen as a separate hack of the Office of Personnel Management (OPM) from the one that the agency revealed...
View ArticleWith payroll in arrears, online antivirus seller shuts doors
The sudden #shutdown of a computer tech support #call center has left some of its employees wondering if they will be paid. #ez tech support, based in Portland, Oregon, took calls from people who had...
View ArticleUber petition site pulled after hacker redirected visitors to rival
A hacker has forced Uber to take its online petition site down after exploiting a vote-spamming flaw which he said was “super easy for the developer of the website to prevent”. The hacker, going by...
View Article