According to the National Institute of Standards and Technology, approximate matching is a...
For small businesses looking to reduce their exposure to data theft the good news is the...
Insurers are eagerly eyeing exponential growth in the tiny cyber coverage market but their lack of experience and skills handling hackers and data breaches may keep their ambitions in check.
U.S. authorities have charged a Chinese businessman with hacking into the computer systems of U.S. companies with large defense contracts, including Boeing, to steal data on military projects, including some of the latest fighter jets, officials have said.
Security information and event management (SIEM) has been an area where I have spent considerable time researching. My research started out as curiosity to see if the technology could solve some problems then continued to get organization buy-in followed by going all in to architect, implement, and manage a SIEM for my organization.
Chinese state media has branded Apple Inc's iPhone a threat to national security because of the smartphone's ability to track and time-stamp user locations.
Late last year, hackers breached Target's data security and stole information from millions of credit cards. Brian Krebs, who writes about cyber crime and computer security for his blog, Krebs on Security, broke the story. A few days later, he broke the story of a credit card breach at Neiman Marcus.
Illegally obtaining TV and movies is almost endemic in the Asia-Pacific region though.
Tiffany Rad is turning the gender stereotypes in the software industry on their head. Rad is a “white hat,” a hacker who specializes in looking for security holes so they can be fixed. The attorney turned her computer hacking hobby into a career in 2008, when she submitted a research proposal to an underground security conference in New York.
The United States wants to restart a cybersecurity working group that China shut down after the U.S. indicted five Chinese military officers on charges of hacking into American companies' computers to steal trade secrets.
As a result of the advance of the so-called Internet of Things, where all devices are connected and communicate with one another, embedded systems — small computer systems built around microcontrollers — are becoming more common. But they remain vulnerable to security breaches.
AccessData and Gigaom Research have released a report on the growing complexities of mobile security and the limitations of “preventive, policy-driven” solutions that are not designed to detect and respond to mobile security incidents that bypass defenses.
Farsight Security, Inc., has emerged from stealth mode at the FIRST Conference in Boston, Massachusetts to debut Newly Observed Domains (NOD), a new set of data solutions that provide real-time actionable insights on young domain names.
Kansas State University's cybersecurity center is receiving national recognition for its dedication to cutting-edge research. The university's Center for Information and Systems Assurance has been redesignated as a National Center of Academic Excellence in Information Assurance/Cyber Defense Research. The designation is from the U.S. Department of Homeland Security and the National Security Agency and is effective from 2014 to 2019.
The nationwide shortage of cybersecurity professionals — particularly for positions within the federal government — creates risks for national and homeland security, according to a new study from the RAND Corporation.
University of New Haven students will join the national effort to combat cybercrime now that the university has become one of just 13 colleges nationwide, and the first in Connecticut, to form a partnership with the Defense Cyber Crime Center (DC3).
Pittsburgh has become the arsenal of cybersecurity. It is home to CMU’s Software Engineering Institute with its 260-person CERT cyber team, and the FBI has placed a nonprofit training alliance here, assigning a data warrior to its helm.
The UK’s National Crime Agency has claimed that PC users have until midnight local time on Tuesday to clean their machines and improve defences against notorious malware GameoverZeus and CryptoLocker.
Ars Technica's Sean Gallagher partnered with NPR tech correspondent Steve Henn for an experiment in Internet surveillance. For one week, while Henn researched a story, he allowed himself to be watched — acting as a stand-in, in effect, for everyone who uses Internet-connected devices. How much of our lives do we really reveal simply by going online?
After years of cooperating with the government, the immediate goal now is to thwart Washington — as well as Beijing and Moscow. The strategy is also intended to preserve business overseas in places like Brazil and Germany that have threatened to entrust data only to local providers.
The announcement on April 7 was alarming. A new Internet vulnerability called Heartbleed could allow hackers to steal your logins and passwords. It affected a piece of security software that is used on half a million websites worldwide. Fixing it would be hard: It would strain our security infrastructure and the patience of users everywhere.
Computer security experts from academia, industry and the larger security community have organized themselves into more than 30 teams to compete in DARPA's Cyber Grand Challenge, a tournament designed to speed the development of automated security systems able to defend against cyber attacks as fast as they are launched.
On June 5, the Cyber Security Summit will take place in Tysons Corner, Virginia; this is a unique high-level forum between the private sector, cybersecurity leadership and the U.S. government.
Some of the world’s best-known security researchers claim to have been threatened with indictment over their efforts to find vulnerabilities in internet infrastructure, amid fears American computer hacking laws are perversely making the web less safe to surf.
Some of the largest U.S. companies are looking to hire cybersecurity experts in newly elevated positions and bring technologists on to their boards, a sign that corporate America is increasingly worried about hacking threats.
Recent research carried out by global information security firm MWR InfoSecurity, supported by CPNI (Centre for the Protection of National Infrastructure), has revealed current and new techniques being used by cyber criminals to steal sensitive information from companies.
With cyber attacks occurring more frequently and becoming more complex, the National Guard is stepping up its efforts to defend critical infrastructure networks and develop the next generation of Cyber Warriors.
- Page 1