To the list of vulnerable, Internet-connected devices - from routers and home alarms to baby monitors and toys - now add the world's most popular electric car: the Nissan LEAF. Nissan says a full fix is forthcoming.
It's been just over a year since health plan Anthem Inc. reported a record-breaking hacker attack affecting nearly 79 million individuals. A number of key lessons have emerged from that breach that other organizations can apply to improve their own data security.
With the Apple-FBI legal battle underway - plus rising worries over cybercrime, the Internet of Things and more - there's plenty to discuss, debate and learn at RSA Conference 2016 in San Francisco.
Think it's tough now for the government to compel Apple to retrieve encrypted data from a locked iPhone? According to news reports, Apple is busy creating new devices and services that will be even harder to hack.
HTTPS isn't what it used to be. In this whitepaper, you'll learn SSL/TLS best practices for securing modern websites, such as HSTS header support, use of SHA-2, and enabling forward secrecy. But, modern SSL doesn't just better secure your site; it's designed for performance, too.
You'll also discover some common...
Although DoS attacks are not a recent phenomenon, the methods and resources available to conduct and mask such attacks have dramatically evolved to include distributed (DDoS) and, more recently, distributed reflector (DRDoS) attacks. These attacks simply cannot be addressed by traditional on-premise solutions....
Tim Cook says he found out about the court order to help the FBI break into the iPhone of one of the San Bernardino shooters from the press. "I don't think that something so important to this country should be handled that way," the Apple CEO says.
Who's right: Apple or the FBI? Our readers continue to debate a magistrate judge ordering Apple to help unlock an iPhone tied to a San Bernardino shooter, raising such issues as strong crypto, backdoors as well as legal and moral responsibilities.
None of the major presidential candidates unequivocally backs Apple in its privacy vs. security battle with the U.S. government over its refusal to help the FBI crack the password of the iPhone of one of the San Bernardino, Calif., shooters. Hear what each of the candidates has to say.
Today's advanced attacks focus more on exploiting human flaws than system flaws. In 2015, attackers shifted away from
automated exploits and instead engaged people to do the dirty work- infecting systems,
stealing credentials, and transferring funds. Across all vectors and in attacks of all sizes,
threat actors...
Leading banking Trojans are expanding their targets, taking aim at industries outside banking to compromise financial accounts and other information, new research shows. And the botnets are proving difficult for law enforcement officials to take down.
Security experts warn enterprises to patch the serious "glibc" domain name system flaw now, with one likening it to a "skeleton key" that could be used against all systems and Internet of Things devices that run Linux.
Automobiles have crash ratings. Do they need ratings for cybersecurity, too? In this interview, security expert Jacob Olcott of BitSight Technologies previews a session he'll moderate at the RSA Conference 2016 that will address this question.
Across the financial industry, banks have implemented strong security measures to detect and respond to online fraud as it occurs. In 2012, the Pulaski Bank management team began work to update its online banking platform. The bank sought to create a "top-of- the- line" platform that gave its retail and commercial...
George Orwell's "1984" imagined an authoritarian society in which the government monitored citizens via their televisions. Viewers who want to play along at home can begin by buying a Smart TV.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.