Stories by Jaikumar Vijayan

U.S. commercial drone industry struggles to take off

By Jaikumar Vijayan | 18 April, 2014 21:36

The U.S. commercial drone industry is still struggling to get off the ground more than two years after President Obama signed into law a bill that permits the civilian use of unmanned aerial vehicles (UAV) over the country's airspace.

Heartbleed flaw affects mobile apps, too

By Jaikumar Vijayan | 12 April, 2014 03:15

Android and IOS mobile applications are just as vulnerable to the Heartbleed bug as websites are, security vendor Trend Micro warned.

6 ways the Internet of Things will transform enterprise security

By Jaikumar Vijayan | 08 April, 2014 00:01

Most enterprise security organizations are unlikely to have a spamming refrigerator on top of their list of things to worry about. But news earlier this year that an Internet-connected fridge was co-opted into a botnet that sent spam to tens of thousands of Internet users is sure to have piqued the interest of at least a few.

Snowden leaks erode trust in Internet companies, government

By Jaikumar Vijayan | 04 April, 2014 22:37

Edward Snowden's revelations about the National Security Agency's data collection practices have eroded the public's trust in major technology companies -- and in the Internet, a Harris Interactive survey found.

NSA phone metadata collection program renewed for 90 days

By Jaikumar Vijayan | 02 April, 2014 07:24

The Obama Administration has secured a 90-day extension of the National Security Agency's controversial authority to collect phone metadata records on U.S. customers under the Patriot Act.

NSA isn't evil, says noted civil libertarian

By Jaikumar Vijayan | 02 April, 2014 06:46

Civil liberties and privacy groups have long criticized the U.S. National Security Agency, but those critics became louder last summer after details of the agency's data collection activities were disclosed in classified documents leaked by Edward Snowden.

Payment card security revamp becoming chip vs. PIN tussle

By Jaikumar Vijayan | 27 March, 2014 19:46

Industry efforts to shore up payment card security after the massive data breach at Target appear to be devolving into a battle over chip vs. PIN technology between retailers and credit card companies.

In rare move, banks sue Target's security auditor

By Jaikumar Vijayan | 26 March, 2014 10:43

Two banks that claim to have suffered losses from the recent data breach at Target have sued Trustwave Holdings Inc., the company that was responsible for validating Target's compliance with the Payment Card Industry Data Security Standard.

In surprise move, Symantec fires CEO Bennett

By Jaikumar Vijayan | 20 March, 2014 23:18

For the second time in less than two years, Symantec Corp. has a new chief executive officer.

Court approves first-of-its-kind data breach settlement

By Jaikumar Vijayan | 17 March, 2014 20:10

Courts have generally tended to dismiss consumer class-action lawsuits filed against companies that suffer data breaches if victims can't show that the the breach directly caused a financial hit.

Major companies, like Target, often fail to act on malware alerts

By Jaikumar Vijayan | 14 March, 2014 10:27

Companies that suffer major data breaches almost always portray themselves as victims of cutting edge attack techniques and tools. The reality, though, is often much more mundane.

Senator's claims of CIA violating computer fraud act shaky, legal expert says

By Jaikumar Vijayan | 13 March, 2014 11:01

Sen. Dianne Feinstein's (D-Calif.) claim that the CIA violated provisions of the Computer Fraud and Abuse Act when it accessed computers used by members of the Senate Intelligence Committee, could be hard to substantiate, according to a leading legal expert.

Tech built to find missing aircraft not always used

By Jaikumar Vijayan | 11 March, 2014 22:02

Aviation experts have cited multiple possible reasons for the problems in the multi-country effort to locate the Malaysia Airlines jetliner that dropped off the grid over the South China Sea four days ago.

U.S. retailers insist on PIN requirement in smartcard rules

By Jaikumar Vijayan | 07 March, 2014 21:05

U.S. retailers are digging in their heels over their need for PIN authentication for Europay MasterCard Visa (EMV) smartcard use here.

CIO not the only one to blame for Target breach

By Jaikumar Vijayan | 05 March, 2014 21:27

That someone had to take the fall for the massive breach at Target is neither surprising nor unexpected. The only question is whether more heads will roll in the aftermath of one the biggest data compromises in retail history.

CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Email Security and Data Protection

Encrypt your sensitive email

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.