Cybersecurity

Nuclear war isn't North Korea's only threat

<b>(CNN) —</b> North Korea has launched 15 missiles in 22 tests in 2017.<p>According to US intelligence sources, the most recent test detonated a 140-kiloton nuclear device, which the North Koreans claim was a hydrogen bomb. (That's 10 times as powerful as the atomic bomb the United States dropped on …

North Korea

Should the U.S. Require Companies to Report Breaches?

Companies like Equifax don’t like you knowing they’ve been hacked—but it would be better for consumers and businesses if they were quicker to report it<p>There are two things we can count on in the wake of the Equifax breach, already credited with exposing a majority of American adults to the …

Identity Theft

Breaking nuclear deal could bring hacking onslaught from Iran

'They’re plenty good enough to cause a lot of difficulty,' said one cyber expert.<p>A move by President Donald Trump to discard the Obama-era nuclear deal with Tehran could bring a swift retaliation from an increasingly aggressive Iranian hacker army.<p>Some of those attacks may target America’s power …

Iran

All the Ways Equifax Epically Bungled Its Breach Response

The breach of the credit monitoring firm Equifax, which exposed extensive personal data for 143 million people, is the worst corporate data breach to …

Identity Theft

Should U.S. Companies Be Required to Report Breaches?

There are two things we can count on in the wake of the Equifax breach, already credited with exposing a majority of American adults to the possibility of identity theft. The first is that more and potentially worse breaches are in our future. The second is that companies will need to be prodded …

News (U.S.)

Cybersecurity Is Now the Biggest Risk Facing Independent RIAs

By Christopher Winn via Iris.xyz If it is not yet apparent, cybersecurity is the biggest risk facing independent RIAs. When the fraud protector becomes the weakest link, it is time to take notice. From mid-May through July 2017, the personal information of approximately 143 million consumers was …

Security

Palo Alto vs. Check Point Software: Which Is the Better Cybersecurity Stock?

Pitting a fast-growing, volatile cybersecurity stock against a steady, conservative player.<p><b>Check Point Software Technologies</b> (NASDAQ:CHKP) has been …

Stocks

Japan, Singapore Sign New Cyber Pact

The city-state inks yet another agreement with a key partner as it confronts cyber challenges.

Security

Major cyber-attack will happen soon, warns UK's security boss

A head of the National Cybersecurity Centre predicts the most serious level of hacking will happen within years<p>A “category one” cyber-attack, the most serious tier possible, will happen “sometime in the next few years”, a director of the National Cybersecurity Centre has warned.<p>According to the …

Security

8 Most Overlooked Security Threats

5/26/2017<br>08:00 AM<p>Businesses know the obvious security threats to watch for, but some of the biggest dangers may not at top-of-mind.<p>3 of 9<p>Internet of …

Security

What we know about the 21 states targeted by Russian hackers

The Department of Homeland Security was short on details when it said Friday that it had notified 21 states of Russian efforts to hack their election systems in 2016. For one thing, the department didn't publicly identify the states. For another, it didn't say how many of the hacking attempts were …

Politics

German Manufacturers Play Defense Against Chinese Hackers

BERLIN—A wave of attacks by Chinese hackers on Germany’s cutting-edge manufacturers is raising alarm in Berlin and prompting the government to step in to defend the country’s competitive edge.<p>The small and midsize companies that make Germany an export powerhouse have landed in the crosshairs of …

Business

Here's Why Cyber Insurance Is a Risky Bet for the Industry

This week, Inc. editors and writers talk about how the cyber policy is today's most popular insurance product, but experts warn that insurers might not be able to handle a wide-scale cyber catastrophe.<p>Welcome to the 135th episode of the Inc. Uncensored podcast, hosted by Inc.'s editor James …

Security

Thomas the Tank Engine Ransomware Wants to See You Naked

Thomas, no! A new piece of purported ransomware features a foul-mouthed Thomas the Tank Engine demanding that you send him nude photos — and implying …

Security

This Google, Microsoft, Samsung-Targeting ‘CCleaner’ Attack Sets an Insidious Trend

An insidious attack trend has been catching my eye lately. It's called the software supply chain attack.<p>The scheme goes like this: Hackers compromise …

Security

Hackers targeted 21 states' election systems last year

The Department of Homeland Security told election officials in 21 states Friday their election systems were hacked in September of 2016, per the …

Politics

Health IT Cybersecurity: 5 Hiring Misconceptions to Avoid

Why healthcare organizations need a good strategy to find talent, or get left behind.<p>The recent WannaCry and NotPetya cyber attacks should remove all …

Security

The Shocking Truth Why Hackers Want Your Business Assets

Are you one of the millions of Americans affected by the massive Equifax data breach?<p>Equifax, one of the three major credit reporting agencies in the …

Intellectual Property

You can now use two-factor authentication to secure your Nintendo account

Additional layer of protection<p>Nintendo is adding a new layer of security to its online accounts: users can now enable two-factor authentication to prevent unauthorized access.<p>To enable the authentication method, users are prompted to download Google Authenticator, which will provide them with a …

Security

How to protect your gaming accounts with two-factor authentication (update)

It’s the best defense against h4x<p>Cybersecurity is of paramount importance these days, considering our ever-increasing dependence on cloud-based services. We store more and more data online, often for convenience but often because there is no other option, and we trust giant corporations to …

Xbox

Russians hackers targeted election systems in 21 states

Russian hackers tried to infiltrate the election systems in the swing state of Wisconsin in addition to 20 other states, a report said …

Elections

The right path forward for Congress on cyber deterrence

Nuclear deterrence was one of the most thoroughly studied doctrines of the 20th Century and went through decades of refinement. Policymakers today …

Security

Cyber Monday 2017: Our guide to the best UK deals

The countdown for Cyber Monday has begun, so here’s everything you need to know to bag a bargain<p>You’ve probably heard of Black Friday by now, but …

Shopping

Finance sector is littered with vulns, and guess what – most can be resolved by patching

Security vulnerabilities across the finance sector have increased more than fivefold (418 per cent) in the last four years, according to a study by …

Information Security

The feds shouldn't blackball Kaspersky without public evidence

Over the past few months, the U.S. government has taken multiple steps to limit federal agencies from using information security products, solutions, …

United States

Cyber Guidance Looks at Satellite Communications Issues

As the industry moves into a smart-shipping era, the risk of cyber threats is at an all-time high. Digitalized ships, increasing interconnectedness, …

Security

India Needs a Credible Deterrence Strategy for Cyberspace

India’s cyber capabilities and intent to act on them are enough to outscore potential political victories they may secure by successfully mounting a …

Security

IoT botnet Linux.ProxyM turns its grubby claws to spam rather than DDoS

An IoT botnet is making a nuisance of itself online after becoming a conduit for spam distribution.<p>Linux.ProxyM has the capability to engage in email …

Security

Understanding Ransomware

John Pironti<p>President<p>IP Architects<p>John P. Pironti is the President of IP Architects, LLC. He has designed and implemented enterprise wide electronic …

Technology

Identifying exposures and vulnerabilities in UC/RTC Environments

Businesses continue to evolve and rely more heavily on Unified Communications (UC) and Real Time Communications (RTC) based applications to run their …

Security