The pressure for businesses to allow their employees to access work resources with their personal mobile devices may be overwhelming. How can healthcare IT and Security staff implement this without giving criminals the keys to the castle?
Facebook has announced a new feature of its Messenger product, which allows friends to send payments directly to each other, reports Tech Crunch.
Google is taking additional security measures to shut out malware from its app store by introducing a human screening process.
Criminals are targeting medical records because of their value, and as a result, medical breaches are the fastest growing type of breach. What can healthcare businesses do to get themselves out of the crosshairs?
USB drives have been known to carry viruses and malware, but a Russian electronics expert has now created a thumb drive that will literally fry your computer’s circuit board with a high voltage surge.
Wondering how secure your Android smartphone is? Well, a 9-year-old cybersecurity expert has demonstrated how hackers could steal contacts, call logs and messages within just 15 minutes.
Advantage Dental has sent out notices to 151,626 customers after a hacking which may have led to the leaking of valuable patient data, according to the Portland Tribune.
This weekend, the BBC’s website went offline. The first conclusion many people jump to? It must be the work of Anonymous hacktivists angry about the suspension of Jeremy Clarkson. But how likely is that?
While there may still be only a handful of women in Information Security, they can be found in increasing numbers in important, high-profile positions. In this post we look at how three women in Federal cybersecurity got their start.
The Obama administration wants greater power to shut down botnets, responding to the growing threat of cybercrime and increasingly complex, modern techniques.
A British bank has been trialling a different type of biometrics, allowing their customers to confirm their identity via heartbeat according to the BBC.
One thing Microsoft has been very public about is Windows 10’s new strategy of releasing patches to update the operating system at different times for consumer and enterprise versions.
In the future, everything around us will be managed by data, and those who have data will have power. So, will anonymity be possible (or desirable)?
Apple fans keen to get their hands on the Apple Watch are advised to think before they click, after hackers exploited a wave of enthusiasm around the launch with a phishing scam linked to a fake giveaway.
Security researchers have managed to launch an attack on Linux computers by targeting a physical weakness in some types of DDR memory chips, Ars Technica reports.
Its been just under three weeks since February 19th, when Lenovo became entangled in a web of controversy over its preinstallation of Superfish’s Visual Search adware on some of its popular consumer laptops during last year’s holiday shopping season.