Google has asked the court overseeing terrorism-related surveillance programs at the U.S. National Security Agency to allow the company to publish information on the number of surveillance requests it receives.
The National Security Agency is creating new processes aimed at making it harder for systems administrators to misuse privileged access to agency systems, NSA officials told the U.S. House Intelligence Committee Tuesday.
A provider doing an ICT security review should give the client what they need, not what they want, says security specialist Daniel Ayers.
A recent study of small- and medium-sized businesses in the US and Europe revealed that many of them are facing challenges in implementing backup and recovery solutions that can help protect their businesses.
U.S. law enforcement agencies have disrupted more than 50 terrorist plots in the U.S. and other countries with the help of controversial surveillance efforts at the U.S. National Security Agency, government officials said Tuesday.
Zero-day attacks, outdated vendor patches, malware toolkits spewing out new variants in their thousands, new threat vectors from unprotected and unmanaged mobile devices.
The source code for the Carberp banking Trojan program is being offered for sale on the underground market at a very affordable price, which could result in additional Carberp-based financial malware being developed in the future, according to researchers from Russian cybercrime investigations firm Group-IB.
As a company that generates 95 percent of its revenues online, Australia-based Wotif.com has paid particular attention to ensuring its operations – whose 500 staff span 19 countries on five continents – are resistant to the depredations of malicious online hackers and well-meaning internal staff alike.
The Canadian privacy commissioner and 36 other data protection authorities on Tuesday raised privacy concerns about Google Glass in an open letter to CEO Larry Page.
Quantum Dawn 2 will test institutions' playbooks while also finding more efficient ways to share real-time information
The average organisation believes it would spot a data breach in ten hours, a McAfee global survey of IT professionals has found. But is that result good, indifferent or an indication of the downright complacent?
Attack Word documents designed to lure victims into opening them were crafted to fetch a PNG image file that contained an exploit for vulnerable versions of Office
Start-up CrowdStrike today made available its first product, called Falcon, designed to detect and block stealthy infiltrations of Microsoft Windows or Apple Macintosh-based endpoint machines and servers.
The National Security Agency's Prism surveillance system is a dangerous hostage to fortune that must be countered using public policy and not simply clever security technologies alone, privacy campaigner and encryption luminary Phil Zimmermann has argued.
Yahoo has received between 12,000 to 13,000 requests for user data from law enforcement agencies in the U.S. between Dec. 1 and May 31 this year, the company said Monday.
A pair of South Carolina lawmakers has introduced legislation that would pave the way for a pilot program involving electronic license plates that could be altered remotely by the state's DMV.
Security experts have been saying for years that insiders -- malicious, careless or simply unaware -- are a greater threat to organizations, both public and private, than hackers.
Google announced via blog post a new technology-driven initiative against child pornography. The company is launching a $2 million Child Protection Technology Fund "to encourage the development of ever more effective tools" to fight online child pornography.
British intelligence agency Government Communications Headquarters (GCHQ) reportedly intercepted the electronic communications of foreign politicians during G20 meetings that took place in London in 2009.
When it comes to data breaches, hackers and organized crime garner most of the headlines, but most data breaches are caused by human errors and system glitches--application failures, inadvertent data dumps, logic errors in data transfer and more. As a result, educating your employees and making sure they're not cutting corners is a big component in preventing data breaches.
Sign up now »
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.