Vulnerable firmware has been highlighted again in a range of low-cost Android phones, raising concerns over their security. This latest incident comes 11 months after security analysts first raised flags.
Cloud-based services can be both a "blessing and curse" when it comes to dealing with security, says John Houston, CISO and associate counsel for the University of Pittsburgh Medical Center, who explains why in this video interview.
When physicians and nurses use their own mobile devices to access clinical information and communicate with patients, an advanced form of encryption can help ensure all sensitive data remains secure, Jonathan Cohen of Synchronoss explains in this video interview.
Adobe will pay a small financial penalty to 15 states to resolve consumer protection and privacy claims following a data breach that affected 38 million active user accounts. The company's legal fees associated with the incident are likely far higher than the settlement amount, experts say.
Prolific hacker Samy Kamkar's latest creation shows how even locked computers can be hacked quite easily, providing further justification for security leaders to block users' computer USB ports.
NIST has issued long-awaited guidance on how to approach IT security as an engineering discipline. It's designed to help organizations build secure, trustworthy systems that meet evolving challenges, including the growth of the internet of things.
A Danish telecommunications company says it has seen successful DDoS attacks directed at enterprise firewalls that could be launched using only a single laptop.
An analysis of how the Donald Trump administration will address health IT security and privacy leads the latest edition of the ISMG Security Report. Also, the ramifications of a big breach, and an FBI agent tackles ransomware.
A week after hackers apparently breached the websites of seven Indian embassies, one of the attackers claims to have breached an Indian consulate in the U.S. and posted data online to draw attention to vulnerabilities.
FriendFinder Networks, which runs thousands of adult-themed sites in what it describes as a "thriving sex community," may have been breached again, according to a website that collects stolen data.
The success of Operation SAMBRE, a global cybercrime investigation into the theft of billions of dollars from banks throughout the world, proves why information sharing between law enforcement and the private sector is key to battling cybercrime.
Yahoo in 2014 spotted that an attacker - later revealed to have compromised 500 million accounts - was inside its network, according to a new SEC filing. With Yahoo's $4.8 billion sale to Verizon still pending, the admission adds to the search giant's complications.
The breach of Democratic Party computers led to the release of a trove of emails embarrassing to Hillary Clinton that might have swayed the election. Should the IT security community fess up? Also, top government cybersecurity policymakers assess President-elect Donald Trump as an IT security influencer.
President-elect Donald Trump will review the nation's cyber vulnerabilities at the start of his presidency, just like Barrack Obama did. But Trump hasn't demonstrated the deep understanding of cyber that Obama did when he took office nearly eight years ago.
An explanation of how the FBI likely was able to quickly review 650,000 emails found on a computer shared by a top aide to Democratic Party presidential nominee Hillary Clinton leads the latest ISMG Security Report. Also, this week's ISMG Fraud and Breach Prevention Summit in London is previewed.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.