CSO Daily Dashboard
Security Smart Newsletter
! Here are the latest Insider stories.
Enterprises misaligning security budget, priorities
What it takes to become an IT security engineer
Cyberwarfare conferences and events calendar for 2017
6 of the most effective social engineering techniques
Suggestions for you
All Business Continuity
Supply Chain Management (SCM)
All Data Protection
Advanced Persistent Threats
Leadership and Management
All Leadership and Management
Metrics and Budgets
All Physical Security
Investigations and Forensics
Michael Kan covers security for the IDG News Service.
The Latest from Michael
Google cites progress in Android security, but patching issues linger
UK follows US ban of electronic devices in cabins on some flights
The U.K. is joining the U.S. in its ban restricting passengers from bringing some electronic devices onto flights from the Middle East.
Russia will strike US elections again, FBI warns
Future U.S. elections may very well face Russian attempts to interfere with the outcome, the FBI and the National Security Agency warned on Monday.
Yahoo breach exposes the drawbacks of state-sponsored hacking
When governments turn to private hackers to carry out state-sponsored attacks, as the FBI alleges Russia did in the 2014 breach of Yahoo, they're taking a big risk.
Crime ring used Amazon, eBay to sell stolen printer ink
A dozen suspects are accused of raking in at least $12 million by putting stolen ink cartridges and retail electronics up for sale on Amazon and eBay, New York’s attorney general said on Wednesday.
US faces limits in busting Russian agents over Yahoo breach
In a rare move, the U.S. has indicted two Russian government agents for their suspected involvement in a massive Yahoo data breach. But what now?
Mirai is the hydra of IoT security: too many heads to cut off
Efforts to stop Mirai, a malware found infecting thousands of IoT devices, have become a game of whack-a-mole, with differing opinions over whether hackers or the security community are making any headway.
WikiLeaks dump brings CIA spying powers into the spotlight
Has the CIA ever spied on you? That’s a key question swirling around Tuesday’s WikiLeaks document dump that allegedly detail the U.S. agency’s secret hacking tools.
WikiLeaks will share CIA hacking details with companies, but can they use it?
WikiLeaks plans to share details about what it says are CIA hacking tools with the tech companies so that software fixes can be developed. But will software companies want it?
WikiLeaks looks at helping tech vendors disarm CIA hacking tools
WikiLeaks has attracted plenty of haters over its controversial disclosures. But the site may be in a unique position to help tech vendors better secure their products
Security holes in Confide messaging app exposed user details
Confide, a messaging app reportedly used by White House staff, apparently had several security holes that made it easier to hack.
CIA-made malware? Now antivirus vendors can find out
Thanks to WikiLeaks, antivirus vendors will soon be able to figure out if you have been hacked by the CIA.
Get the latest security news and analysis.
Sign up for our CSO Update newsletter
BitSight Interactive Benchmark
Connecting Financial Services' Hybrid IT Infrastructure
Connect, Protect, and Manage Your Mobile Fleet
Data Lake: Harnessing the Power of Unstructured Data
The State of Legacy Monitoring Tools
This ad will close in 20 seconds. Continue to site »