Federal authorities have arrested a Chinese professor, accusing him of pilfering trade secrets from the computer systems of American high-tech companies where he and a co-conspirator once worked.
When security succeeds, it is often unnoticed. That success might also make security investments hard to sustain, given its low profile in organizations. Gartner's Tom Scholtz discusses articulating security's business value.
Breaches like the Target breach of 2013 and the recent "Heartbleed" bug may give you the impression that breaches are just an electronic problem but they aren't. It's impossible for you to personally protect your data everywhere. Comprehensive identity theft protection from LifeLock helps safeguard your finances,...
Thanks to the huge proliferation of mobile devices, millions now take their online shopping, banking, socializing and their jobs on the go. But this always-connected lifestyle has come at a steep price, as a new breed of sophisticated criminals has learned how to exploit those users' mobility to harvest personal data...
Did information security expert Chris Roberts exploit vulnerabilities in airplanes' onboard entertainment systems, allowing him to access a plane's thrust management computer and cause it to climb?
An army of 40,000 small office/home office routers have been exploited by automated malware. But who's responsible for devices being vulnerable: vendors for using well-known defaults; or distributors and IT managers for not locking them down?
The Reserve Bank of India plans to set up an IT subsidiary to help banks strengthen cybersecurity. Banking and security leaders say this is a positive move toward responding to cybercrime trends.
Penn State University's College of Engineering computer network has been victimized by two sophisticated cyberattacks, with at least one originating from China.
The use of century-old laws and the lack of a data protection regime is hurting India's ability to combat cyberfraud, says independent adviser Nandkumar Saravade. What immediate steps must be taken?
The pharmaceutical industry is data-rich, and CISOs of the sector face a huge challenge in protecting its intellectual property. GlaxoSmithkline's Steve Williamson offers tips for securing the data lifecycle.
Caffeine junkies are up in arms over reports that criminals have been targeting their Starbucks account balances. But the real story is poor password-picking practices by consumers, and Starbucks' lack of multi-factor authentication.
The public demands accountability for data breaches involving systems that include personally identifiable information (PII) and expects that all educational institutions will have the same levels of security that Fortune 500 companies do. However, most educational institutions have fewer IT security resources than...
The public demands accountability for data breaches involving government systems and expects that all government entities have the same levels of security that Fortune 500 companies do. However, most government organizations have fewer IT security resources than their larger enterprise counterparts, yet they face the...
The public demands accountability for data breaches involving private healthcare information and expects that all healthcare institutions will have the same levels of security that Fortune 500 companies do. However, most healthcare organizations have fewer IT security resources than their enterprise counterparts, yet...
To battle nation-state cyberthreats, the U.S. must work with its allies to develop norms of behavior in cyberspace that could then be adopted by other nations, experts said at a Senate hearing.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.