Sign up to our newsletter
Indiana’s Attorney General has launched an investigation into a data breach at Medical Informatics Engineering, which has affected up to 4 million people.
It’s not all about crashing cars and hacking guns: what’s hot at Black Hat 2015 USA (#BHUSA) and how to get the most from the event.
Recent aggressive hacks on companies underline the need for good risk analysis, situational awareness, and incident response. Just ask AshleyMadison, Hacking Team, and Sony Pictures.
Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences.
Operation Patao Express – Attackers spying on high-value targets in Ukraine, Russia and Belarus, and their TrueCrypt-encrypted data.
As the cost of fixing security mistakes in Jeep Chrysler Dodge vehicles mounts, so does the need for manufacturers to weigh cybersecurity risks in the product development process, alongside features and benefits.
The majority of managers believe that IT risk management data genuinely influences board decisions, according to Gartner.
Security researchers have created a practical privacy attack out of a well-known theory around user behaviour. The attack appears to defeat privacy measures such as Tor.
Moonpig, the online personalised card company, has blocked the accounts of an unspecified number of customers after users’ details were published online.
Security experts and non security experts take very different attitudes to staying safe online, according to new research.
Accidental ‘pocket dials’ are now admissible in evidence against you, the US Appeals court has ruled.
Information security could use some good news right now, something to offset the string of bad news about data breaches and system vulnerabilities; so how about this: “Cyber Criminal Forum Taken Down, Members Arrested in 20 Countries”.