Not too long ago news broke of yet another substantial data breach. This time at financial consultancy Deloitte — one of the so-called big four accounting firms. On Sept 25, Deloitte announced that it had detected a breach stemming from an inadequately secured administrative email system that gave the attacker(s) access to the firm’s global email system.
All about Virtualization and Cloud Security | Recent Articles:
Security research firm IOActive recently set out to investigate the security of 21 mobile brokerage apps used for trading stocks and other equities. The results were less than reassuring.
If you are a Linux user you might want to keep an extra eye on your systems and be ready to patch — as soon as patches do become available that is. Google researchers this week made public seven vulnerabilities they uncovered in the Linux DNS software package Dnsmasq.
Thousands of Apple Macs vulnerable to un-patched firmware, regardless of operating system patching levels. The security firm Duo Labs recently set out to study the security of Mac firmware, more specifically the EFI (Extensible Firmware Interface) in Macs for the past three years. Think of EFI as the modern BIOS (Basic Input / Output System) manages the boot process of a computer system as well as communications between the operating system and other devices such as video, keyboard, printers, and mice.
While most eyes interested in cybersecurity for the past two weeks have been focused upon (and for good reason) the Equifax breach, the U.S. Food and Drug Administration (FDA) continued its pressure on medical device manufacturers to build security into product design — just as the U.S. Department of Homeland Security warned the medical community of eight vulnerabilities in Smiths medical wireless infusion pumps.
The second rule of data breaches should be (the first being don’t have one) to stop doing harm. On this account, Experian failed considerably.
We can’t always make it to the conference, and when we do we can’t always get to see every talk we’d like to see. That’s one of the reasons why I like to shop around YouTube from time to time and look for talks I wish I’d seen in person.
An analysis of healthcare data breaches for the first half of the year shows that the healthcare industry is on the path to suffer more one data breach a day this year.
One doesn’t have to look far to see software is vulnerable, and who better to discuss the perceived state of software security than developers. With that in mind, Netsparker recently conducted a survey that looked at the views of developers on eactly this subject.
A bill introduced earlier this week in the United States Senate aims to bolster the security of Internet-connected devices by using the vast-purchasing power of the United States Government to enforce a baseline security standard.
A cybersecurity breach scandal involving the Swedish Transport Authority, Transportstyrelsen, erupted late last week and throughout the weekend according to numerous news reports.
When it comes to attaining readiness for General Data Protection Regulation (GDPR) the clock is ticking. The GDPR is a set of regulatory mandates (Regulation (EU) 2016/679) that seek to shore up and streamline data protections for citizens within the European Union, including providing residents control over data about them and limiting exports of such data outside the union.