Android security in the enterprise - can the worst flaws be fixed?
How do Android's growing list of vulnerabilities affect enterprises and is there much they can do about them?
John E Dunn | 10 Aug | Read more
How do Android's growing list of vulnerabilities affect enterprises and is there much they can do about them?
John E Dunn | 10 Aug | Read more
Dr. John Halamka has taken to his <a href="http://geekdoctor.blogspot.com/2015/08/the-security-of-medical-devices.html">"Life as a Healthcare CIO" blog</a> to sound the alarm on medical device threats in the wake of the FDA late last week issuing its first cybersecurity warning about a specific medical device.
Las Vegas -- Security researchers need to fight for the rights to study, modify and reverse engineer Internet hardware and software or the general population risks losing Internet freedom, the Black Hat 2015 conference was told.
Tim Greene | 06 Aug | Read more
A security researcher has posted a video on YouTube demonstrating how a device he made can intercept wireless communications to locate, unlock and remotely start GM vehicles that use the OnStar RemoteLink mobile app.
Lucas Mearian | 31 Jul | Read more
A week after it was revealed that a Chrysler Jeep could be hacked and remotely controlled, two U.S. senators have called for the National Highway Traffic Safety Administration to investigate potential widespread risk for consumers.
Lucas Mearian | 29 Jul | Read more
After the Office of Personnel Management breach, medical data was labeled as the "<a href="http://www.reuters.com/article/2015/06/05/cybersecurity-usa-targets-idUSL3N0YR30R20150605">holy grail</a>" for cybercriminals intent on espionage. "Medical information can be worth 10 times as much as a credit card number," reported Reuters. And now to steal such information, hospital networks are getting pwned by malware-infected medical devices.
Darlene Storm | 09 Jun | Read more
Replacing a hacked credit card is an annoyance. Rebuilding a hacked identity can be a time-consuming and expensive headache.
Taylor Armerding | 03 Jun | Read more
A security manager might be turned off when a job candidate calls him "dude" several times during the course of an interview, but it was a minor infraction that Todd Borandi had to overlook. Like many security team leaders seeking highly sought-after technical skills for his incident response team, he had to let small transgressions slide.
Stacy Collett | 28 May | Read more