News

Brad Antoniewicz cisco
code programming software bugs cybersecurity

White House (public domain)

Experts: US needs a federal CISO

Last week, the Trump administration announced the appointment of a White House cybersecurity coordinator. That's a good first step, security experts say, but the government also needs to have a federal CISO

burlap money bag

Enterprises misaligning security budget, priorities

Those on staff who are doing the budgeting might blindly write the same amount into the security line every year. Or the C-suite might handcuff the security personnel with a tight budget that doesn’t allow for expansion into new...

05 passwords

iPhone, Mac owners: How to stymie hackers extorting Apple, threatening to wipe devices

Hackers claiming to have hundreds of millions of iCloud credentials have threatened to wipe date from iPhones, iPads and Macs.

p1200736

Google cites progress in Android security, but patching issues linger

The chances of you installing malware on your Android phone is incredibly small, according to Google.

00 7spies title

How worried should your organization be about cyber espionage?

Criminal gangs are turning over millions from breaching businesses - but the organisations with the biggest budgets are the intelligence agencies of nation states. How seriously should your organisation take cyber espionage?...

castle moat

Securing the modern day castle: defense in depth

What today's defenders can learn from the defense philosophy of medieval times

facial recognition

US lawmakers question police use of facial recognition tech

U.S. lawmakers plan to introduce legislation to limit the FBI's and other law enforcement use of facial recognition technology after concerns about the mass collection of photographs in police databases.

iphone7 Apple store

Hackers threaten to wipe millions of Apple devices, demand ransom

A group of hackers is threatening to wipe millions of iOS devices in two weeks if Apple doesn't pay them US$150,000.

gun mirror spy

Double Agent attack can turn antivirus into malware

An attack discovered by Cybellum called Double Agent can take over antivirus software on Windows machines and turn it into malware that encrypts files for ransom, exfiltrates data or formats the hard drives.

money handout

Follow the money! Where VC security investment is occurring

Where is investment happening now in security? Jeff Fagan, the founder of Accomplice, tells us about priorities in VC funding today

IRS

IRS issues new tax scam warnings, FSA tool suspended due to security concerns

The Internal Revenue Service (IRS) has issued a new warning to businesses, taxpayers, and tax prep professionals about Phishing scams targeting the sensitive information they work with on a daily basis. Soon after, the IRS and the US...

rebecca gurley bace

Goodbye Mama Bear, the cybersecurity community will miss you

Becky Bace, top woman in cybersecurity, has passed away.

code programming software bugs cybersecurity

Flaws in Moodle CMS put thousands of e-learning websites at risk

Organizations that use the popular Moodle learning management system should deploy the latest patches as soon as possible because they fix vulnerabilities that could allow attackers to take over web servers.

emirates airlines dubai international airpor

UK follows US ban of electronic devices in cabins on some flights

The U.K. is joining the U.S. in its ban restricting passengers from bringing some electronic devices onto flights from the Middle East.

keyboard chinese flag china hacker

5 reasons why China will rule tech, 2017 edition

In 2010, Computerworld looked at five reasons why China will rule in technology. In 2017, the case for China has grown stronger.

p1200649

Mozilla beats rivals, patches Firefox's Pwn2Own bug

Mozilla has already patched a Firefox vulnerability revealed during Pwn2Own, the first vendor to fix a flaw disclosed at the hacking contest.

watson dumb executives primary2

Report says smart people do dumb things online

People from the religious and legal fields were considered lazy for not following security standards.

ladder escape

Pwn2Own hacking contest ends with two virtual machine escapes

Two teams of researchers managed to win the biggest bounties at this year's Pwn2Own hacking contest by escaping from the VMware Workstation virtual machine and executing code on the host operating system.

Load More