Security researchers warn of "Xara" flaws in Apple iOS and OS X that could be used to intercept passwords and banking data, as well as a keyboard app that puts more than 600 million Samsung device users at risk.
Chris Feeney, recently named president of BITS, the technology and policy division of the Financial Services Roundtable, describes his top cybersecurity priorities, including helping members deal with insider threats.
Sony's 2014 cyber-attack cleanup costs continue to mount. The company reports spending $35 million on remediation as of March, and costs will continue to mount, now that a judge has ruled that a class-action lawsuit by former employees can proceed.
India's burgeoning mobile penetration has led to a massive uptake in app usage. Frenetic development to meet demand has found security ignored. Dhananjay Rokde discusses how this ecosystem functions today.
Wipro has developed a fraud detection model for improved risk management using big data analytics. Can CISOs leverage it to reduce risk, enhance process efficiency and refine fraud detection algorithms?
It's still early days for mobile e-commerce in India, but with the quantum of users increasing exponentially, HDFC Bank's new mobile payments platform may be the direction in which the industry is headed.
Forget attributions of the German parliament malware outbreak to Russia, or Chancellor Angela Merkel's office being "ground zero." The real takeaway is the Bundestag's apparent lack of effective defenses or a breach-response plan.
In the wake of a May cyber-attack against the IT infrastructure of Germany's lower house of parliament, or Bundestag, investigators say they have been unable to eradicate all traces of the Trojan infections, and that up to 20,000 PCs might need to be replaced.
At ISMG's Healthcare Information Security Summit, a CIO and two CISOs offered insights on winning CEO support for information security spending as well as building a culture of security. Find out what they had to say.
A massive breach at the U.S. Office of Personnel Management wasn't discovered by government sleuths - or the Einstein DHS intrusion detection system - but rather during a product demo, a new report says.
EdgeWave's Mike Walls, a former bomber pilot who led Navy red teams, says penetration testing is useful in analyzing bits and bytes but not the readiness of operations under attack from cyberspace. Red teams, he says, can analyze the impact on operations.