News Analyses

10 threat landscape apocalypse ruins
secure encrypted internet web browser alert

Facebook / privacy / security / breach / wide-eyed fear

Facebook secretly paid users $20 a month to use VPN spying app

After it was revealed that Facebook secretly paid people to use the Facebook Research VPN app, the social media site pulled the iOS version. But the Android version will continue.

patching against ransomware

The three most important ways to defend against security threats

Patching, security training programs and password management will thwart attacks more effectively than anything else. You're already doing them. Here's how to do them better.

Election 2016 teaser - Electronic voting security for digital election data

Why one of America’s top experts is hopeful for better election security

Voting machines and elections in general are still vulnerable to hacking, says Matt Blaze, but adoption of risk-limiting audits and software independence gives opportunity for improvement.

Facebook / privacy / security / breach / wide-eyed fear

How Facebook's privacy woes might change the rules of the road in 2019

Following a string of data privacy and protection missteps, Facebook faces potential backlash from legislators and consumers that could affect all companies that process consumer data.

Computerworld - Scary Tech [Slide-05] - Encryption systems with backdoors

What is Australia's AA Bill and how will it affect US companies?

Australia's new AA Bill turns Australian employees and vendors into a supply chain security risk.

broken chain metal link security breach

Maybe we have the cybersecurity we deserve

Companies have focused more on making the consumer recovery process from fraud and data breaches easier than on better security. Most people seem OK with that.

13 communicate security strategy threat education

Finally, a meaningful congressional report on stemming cybersecurity attacks

The Cybersecurity Strategy Report offers solutions to six problem areas in an effort to improve IT's ability to cope with today's cyber threat landscape.

security trust

What is digital trust? How CSOs can help drive business

Chief security officers should play a key role in building trust with customers, and that translates to better customer acquisition, greater customer loyalty, and more revenue.

certificate

Google makes good on promise to remove some Symantec PKI certificates

If you get this digital certificate error using Chrome, then Google now considers that website's Symantec PKI certificate untrustworthy.

group of hackers in digital environment

Cylance researchers discover powerful new nation-state APT

A new APT, dubbed White Company, is flexing its muscle on the world stage, and it has security researchers worried.

deepfakes fake news unreal doctored malicious personal attack video audio

Doctored Jim Acosta video shows why fakes don’t need to be deep to be dangerous

White House promotion of an allegedly doctored press conference video shows how "shallow fakes" can manipulate opinion.

hovering drone / camera / propellor blades

Critical authentication flaw in DJI drone web app fixed

Check Point researcher finds vulnerability that could have allowed attackers to spy on drone fleets in real time.

stateofcybercrimethumb

State of cybercrime 2018: Security spending up, but so are the risks

IT and security management use more technology to defend against sophisticated hacker attacks, but still lag on security training.

thumbnail
video

Mingis on Tech: All about the iPhone XR, new iPad Pros and the MacBook Air

In just a few days, Apple's eagerly-awaited iPhone XR finally arrived and the company rolled out new tablets, laptops and even a Mac mini. Here's what matters.

hunting and monitoring security threats

Burned malware returns, says Cylance report: Is Hacking Team responsible?

Burning malware forces attackers to evolve, not go away. Network defenders take note.

digital network privacy - eavesdropping

Are mixnets the answer to anonymous communications?

Combined with strong encryption such as the Signal protocol, modern mixnets could achieve the Holy Grail: metadata-resistant secure communications.

smart city iot iiot buildings skyline matthew henry unsplash

Hacking smart buildings

Smart buildings are giant IoT devices begging to get hacked. A new report offers concrete advice on how to mitigate the risk to building automation and control systems (BACS).

asia china flag grunge stars pixabay etereuti

China’s MSS using LinkedIn against the U.S.

The head of the U.S. National Counterintelligence and Security Center says China's MSS is using social networks, specifically LinkedIn, to target, access, and recruit U.S. sources.

Load More