Will the 2016 US presidential campaign get hacked?
As the 2016 presidential race heats up, Wakefield Research examined American perceptions of the threat of political hacking, and which of the leading U.S. presidential …
137 major incidents disrupted EU telephony and Internet access in 2014
ENISA publishes its Annual Incidents report which gives the aggregated analysis of the security incidents causing severe outages in 2014.The report provides an overview on an …
Intel establishes automotive security review board
To mitigate cyber-security risks associated with connected automobiles while encouraging technological progression and innovation, Intel established the Automotive Security …
Week in review: Android ransomware multiplies, FireEye censors researcher
Here’s an overview of some of last week’s most interesting news and articles:Hacker had access to sensitive info about Firefox bugs for over a yearMozilla has …
New malware can make ATMs not give users’ card back
“A new type of malware that can be used to compromise ATMs independently of who their manufacturer is, and can make the machine steal card data but also the cards …
Apple complicates app sideloading in iOS 9 for increased security
Making things easier for users is generally a good idea, but sometimes complicating a process could lead to increased security, and should be the preferred option.A blog post …
FireEye legally censors crucial parts of a researcher’s talk at 44CON
Felix Wilhelm, a researcher with German security firm ERNW, was scheduled to give a talk at 44CON on Thursday about the critical vulnerabilities he and his colleagues found in …
Do conventional security measures negatively impact productivity?
91 percent of business respondents reported that their productivity is negatively impacted by security measures their employer has put in place, according to Dell. However, if …
63% in favor of encryption backdoors to respond to national security threats
Vormetric did a survey on how Americans view “backdoor” access by government entities to the encrypted data of private businesses. Ninety-one percent recognized …
Vulnerability management embraces new functions
Vulnerability management (VM) solution providers have always held their own in the global network security domain. VM technologies scan network endpoints such as desktops and …
US Energy Department’s systems breached 159 times in four years
The US Department of Energy (DOE) has had its computer systems successfully breached by cyber attackers 159 times in four years, USA Today reports.The US DOE is responsible, …
Attack code for critical Android Stagefright flaw published
After having graciously waited for quite a while to publish the exploit for the Android Stagefright vulnerability (CVE-2015-1538) so that Google, mobile carriers and device …
Featured news
Resources
Don't miss
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground
- Open source has a malware problem, and it’s getting worse