Car hacking via compromised car diagnostic tools
Car hacking is a topic that has received considerable attention from security researchers in the last year or so, and the general public and (hopefully) lawmakers are finally …
Is your board ready for a security incident?
Businesses suffered nearly 43 million known security incidents in 2014. This increased 48% compared with 2013 and equals some 117,000 attacks daily. And still, many boards and …
Prevention is the best cure for identity theft
In 2014, 85 percent of people took steps to prevent identity theft, according to ARAG, a provider of legal insurance. Checking credit reports, shredding documents with …
The changing role of the risk manager
71% of risk managers say their overall level of influence is greater now than it was three years ago according to a survey of 500 companies in EMEA conducted for ACE European …
Week in review: The evolution of the CISO, a simple Gatekeeper bypass, and Stagefright 2.0
Here’s an overview of some of last week’s most interesting news and articles:Leaked Hacking Team emails show Saudi Arabia wanted to buy the companyEmails stolen in …
Advertising malware affects non-jailbroken iOS devices
“YiSpecter is infecting iOS devices belonging to Chinese and Taiwanese users, and is the first piece of malware that successfully targets both jailbroken and …
Personal info of 15 million T-Mobile USA customers stolen in Experian breach
Personal information of some 15 million T-Mobile US customers and applicants has been stolen by hackers who managed to breach several Experian servers. The credit agency …
Exposing fraud behavior patterns associated with compromised identities
Timeliness of detection and diversity of data sources are critical factors in countering attempts to compromise consumer identities, according to ID:A Labs.Understanding fraud …
With unprotected keys and certificates, businesses lose customers
Unprotected and poorly managed keys and certificates result in a loss of customers, costly outages, failed audits, and security breaches, according to The Ponemon Institute …
Employee use of cloud services puts business data at risk
UK companies are placing themselves at risk of cyberattacks and data breaches as a result of rampant use of cloud storage services and unclear or non-existent corporate …
Unsurprisingly, companies are not protecting personal information
According to a global survey of privacy and risk professionals, more than half of the 780 respondents say consumers should not feel confident that companies are adequately …
New, improved Ghost Push variants continue to target Android users
“The danger of apps Trojanized with Ghost Push malware is far from over – according to Trend Micro researchers, the number of variants of the hard-to-remove …
Featured news
Sponsored
Don't miss
- Critical 1Password flaws may allow hackers to snatch your passwords (CVE-2024-42219, CVE-2024-42218)
- “0.0.0.0-Day” vulnerability affects Chrome, Safari and Firefox
- NIS2: A catalyst for cybersecurity innovation or just another box-ticking exercise?
- Microsoft 365 anti-phishing alert “erased” with one simple trick
- “Perfect” Windows downgrade attack turns fixed vulnerabilities into zero-days