Archive

The Department of Veterans Affairs is on what appears to be an irreversible losing streak when it comes to its annual cybersecurity audit. Last week, VA’s Office of the Inspector General slapped the agency with a “material weakness” designation for

AUSTIN, TX – We’re all aware of well-publicized security breaches and cases of cyber terrorism. In 2014 the hack of Sony Pictures brought worldwide attention and nearly brought the studio’s business to its knees, and will cost Sony millions to

In hopes of eliminating the password, at least on the company’s mobile apps, Yahoo on Friday deployed a stable version of its Account Key mechanism. The feature, essentially two-step authentication—without the first step—allows Yahoo users to log into the company’s Finance,

Piracy, cybercrime and the potential salvage challenges posed by “mega ships” are listed among risks facing the shipping industry in an Allianz report on safety in the sector. The 2016 Safety and Shipping review points to the potential risk of

Web giants are collaborating to fix some of the problems that expose STARTTLS to attacks that downgrade encrypted connections to insecure ones. Amazon, Facebook, Google, Microsoft, Yahoo, and others have all started supportingSTARTTLS, an extension that can upgrade plain text

With our lives increasingly reliant on smartphones, tablets, smart meters, wearable technology and other internet-connected products, more and more of our personal data is being collected online. But for the most part, users don’t have any indication as to what

According to a court filing, an unnamed party on Sunday demonstrated a method for unlocking an iPhone tied to San Bernardino terror suspect Syed Rizwan Farook. If the FBI has indeed stumbled onto a working encryption workaround, it would no

ON THE EVE of his company’s court date with the FBI, where it will defend its right to not weaken the security of its own devices, Apple CEO Tim Cook took the stage at a small theater in Cupertino to

A bipartisan group of U.S. senators has begun circulating long-awaited draft legislation that would give federal judges clear authority to order technology companies like Apple to help law enforcement officials access encrypted data, according to sources familiar with the discussions.

When we speak of security exploits, we usually refer to software that take advantage of vulnerabilities in other software. Rowhammer, however, is a rare breed. Discovered almost exactly a year ago, it involved software exploiting vulnerability in hardware, in this

MITRE Corporation, the non-profit organization that manages the CVE vulnerability reporting and tracking system, has launched a new platform to fast-track the process. The new pilot system was announced following security researchers’ increasingly vocal frustrations using the previous platform, which has been

Apple devices contain a security flaw that could allow hackers to steal private pictures and videos, it has been claimed. Students from John Hopkins University have identified a bug in an Apple security mechanism which is used to make sure

The number of zero-day vulnerabilities last year was the same as in 2014, according to a new study by vulnerability management outfit Secunia. Last year Secunia Research at Flexera Software recorded a total of 16,081 vulnerabilities in 2,484 products from

WASHINGTON — Roughly a third of the 200 million emails received by the U.S. House in 2015 were comprised of malware, viruses or spam, according to the top House administrator. House officials used cybersecurity tools to detect and block those emails, but the people trying to breach

A new report claims that although officials warned Hillary Clinton that using a smartphone to conduct government business was a security risk, she failed to acknowledge the security risk and did it anyway. Soon after Clinton took office as secretary

Home Depot agreed this week to pay $19.5 million to compensate the 40 million cardholders it said were impacted by a massive 2014 data breach. As part of a proposed settlement by Home Depot, it admits no wrongdoing or liability