cybersecurity
Hackers Carjack Jeep in IoT Nightmare
Two hackers successfully took control of a Jeep Cherokee as it hurtled along a highway at 70 miles per hour, turning an Internet of Things nightmare into reality – ...Full Article
Are Breaches Killing Flash?
Mozilla added the Flash Player Plugin to its roster of blocked add-ons, after yet another security alert from developer Adobe and following a public call for the end of ...Full Article
How to Protect Your Data from Third-Party Breaches
The December 2013 Target data breach that compromised the credit card information of 40 million customers was the first of many wake-up calls to organizations, bringing home the damage ...Full Article
The Day the Networks Died: Attack or Glitch for NYSE, United?
The New York Stock Exchange (NYSE) resumed trading at 3:13 pm EST today, after an "internal technical issue" suspended operations for almost four hours. Only three days after HackingTeam ...Full Article
Manta Beats Bots with Automated Protection
As a destination site where about 30 million small and midsize companies market themselves to each other and consumers, Manta is attractive to another form of traffic: web scrapers ...Full Article
Slam the Door Against Insider Threats
When a banker falls behind on the mortgage, a physician gets arrested for driving under the influence, or a contractor is working on a sensitive federal construction site under ...Full Article
To Improve Cybersecurity, Fire Some CEOs
Despite the amazing number of cybersecurity breaches, so far the Target CEO appears to have been the only one to pay the price. While we hear some calls for ...Full Article
RAND Corp: Manage Security Like a Business
Organizations must figure out a better way to manage cybersecurity like a business, using metrics to determine the relative return on investment (RROI), and constantly evaluating the lifecycle and ...Full Article
How to Avoid Being a Hacker Victim
Following in the wake of the recently publicized attacks on government databases and systems, all CIOs and chief security officers should assume their own organizations could be next and ...Full Article
Federal State of Cyber Insecurity: New Day, New Breach?
When the United States government accused China of hacking the Office of Personnel Management and gaining access to the records of 4 million current and former federal employees, it ...Full Article