Strava fitness app included a heat map of movement in their newest application upgrade which could be used against military bases.
- By Sydny Shepard
- Jan 30, 2018
Facebook as hired a former White House official as its first head of cybersecurity policy.
- By Sydny Shepard
- Jan 26, 2018
CSLS now offers a product contest for safety and security products found on campuses.
- By Sydny Shepard
- Jan 25, 2018
According to a report released by Norton, hackers stole $172 billion from overconfident consumers in 2017.
- By Sydny Shepard
- Jan 25, 2018
Every year, we pause on January 28 to focus on data privacy and protection for the annual International Data Privacy Day.
- By Jason Cronk, Jessica Walton
- Jan 24, 2018
The chaiOS bug can freeze or restart your phone without even having to click the link.
- By Sydny Shepard
- Jan 19, 2018
The security of the Winter Olympics is analyzed just days before the Games kick off in Pyeongchang.
- By Sydny Shepard
- Jan 18, 2018
Brandjacking isn't new, but you should be aware of the ways you could be getting scammed.
- By Sydny Shepard
- Jan 18, 2018
Banks and other financial institutions must have a security program in place with defined processes in the event of a breach, even when the breach is not the result of any failure of their own. It’s not just best practice – it’s the law.
- By Jon Tavares
- Jan 15, 2018
New research suggests that attacks based on open source code vulnerabilities will increase by 20 percent this year.
- By Joe McCann
- Jan 11, 2018
Last week, two major security flaws were discovered in the microprocessors inside nearly all computers.
- By Sydny Shepard
- Jan 09, 2018
ISC West will debute its SIA Education@ISC session lineup for the 2018 show in Las Vegas in April.
- By Ralph C. Jensen
- Jan 08, 2018
It seems that Uber is still learning from its mistakes, even as it continues to grow at a rapid rate. But for other companies, the security breach provides a few key lessons.
- By Matthew Walker Jones
- Jan 08, 2018
Use of personal cellphones by White House staffers and guests will be banned in the West Wing, the Trump Administration said Thursday.
- By Jessica Davis
- Jan 05, 2018
The vulnerabilities, which were originally believed to only be in Intel chips, affect a variety of chip vendors and could allow hackers to steal the entire memory contents of computers, mobile devices and services running in cloud computer networks.
- By Jessica Davis
- Jan 04, 2018
Before you go wading into all your unread emails from over the holidays, it’s a good idea to brush up on phishing email scams, which can lead to financial loss, compromised accounts, identity theft, ransomware infection and insecure data.
- By Jessica Davis
- Jan 04, 2018
As we enter 2018 and desire to protect both our own personal digital assets as well as critical corporate data, it is useful to examine the anticipated key trends in cybersecurity in 2018.
- By Ebba Blitz
- Jan 02, 2018
In 2018 we can expect to see continued creativity from nation-state actors, a growing focus on industrial control systems, and efforts to compromise the software supply chain.
- By Toni Gidwani
- Dec 28, 2017
- By Dmitri Alperovitch
- Dec 26, 2017
This holiday season, however, after a year of nasty data breaches, it feels appropriate to take Dr. Seuss’ How the Grinch Stole Christmas[2] and analyze it with some of the basic questions we ask during a data breach.
- By Tyler Reguly
- Dec 22, 2017