Information Technology Security
Twitter is urging its account holders to be smarter with their passwords following two recent attacks by hackers directed at Burger King and Jeep that took control of those accounts.
The British Phonographic Industry is seeking to block file-sharing sites Fenopy, H33t and Kickass Torrents, the BPI said on Tuesday.
Joe Lieberman (I-Conn.) retired in January after quite a colorful two-dozen years in the U.S. Senate. One of the major issues he pushed for during his last few years in office was protection of the U.S. critical infrastructure. Along with Sen. Susan Collins (R-Maine), Lieberman put forth a series of bills aimed at requiring some level of protection for such infrastructure, the last of these being voted down in November.
A new report traces a large cybersecurity threat group to China's People's Liberation Army, specifically an unit that goes under the cover name "Unit 61398".
On Monday The Pirate Bay, the world's largest file sharing site, reported an anti-piracy organization to Finnish police for allegedly breaching its copyright.
Sure, those fancy new 802.11ac routers are wicked fast, but the IEEE isn't expected to ratify that standard until later this year. So today's 802.11ac hardware could be rendered obsolete if the standards body changes course between now and November.
In what is turning out to be a repeat of last year, privacy rights groups launched an assault against the Cyber Intelligence Sharing and Protection Act (CISPA), barely a day after the controversial legislation was reintroduced in Congress on Wednesday.
Microsoft this week patched 14 vulnerabilities in Internet Explorer, preparing the browser for its time as a target early next month at the annual Pwn2Own hacking contest.
A recently found exploit that bypasses the sandbox anti-exploitation protection in Adobe Reader 10 and 11 is highly sophisticated and is probably part of an important cyberespionage operation, the head of the malware analysis team at antivirus vendor Kaspersky Lab said.
Chances are, if you don't know the dangers involved, you shouldn't jailbreak.
President Barack Obama's cybersecurity executive order, signed on Tuesday, could significantly expand the list of companies categorized as part of U.S. critical infrastructure sector, security experts said Wednesday.
Two U.S. lawmakers have reintroduced a controversial cyberthreat information-sharing bill over the objections of some privacy advocates and digital rights groups.
President Barack Obama's cybersecurity executive order elicited guarded praise from several quarters even as it revived calls for more comprehensive bipartisan legislation to address long-term security threats.
U.S. President Barack Obama has signed an executive order requiring federal agencies to share cyberthreat information with private companies and to create a cybersecurity framework focused on reducing risks to companies providing critical infrastructure.
The Anonymous hacking collective Tuesday said it plans to disrupt the live web stream of President Barack Obama's State of the Union address tonight.
President Obama could use tonight's State of the Union address to continue a push for new cybersecurity legislation, even as he's widely expected to issue an executive order Wednesday to impose rules aimed at protecting critical infrastructure targets, security experts say.
Microsoft Office is the most popular word processing suite around, when it comes to generating documents. But a lot of people are completely unaware that, every time you open a document, type in it, edit it, close it, or do anything more than breathe on it, personally identifying data called "metadata" is collected and attached to the document. Disclosure of this information can be very detrimental in certain situations, so it pays to spend an extra few minutes before sending someone the file, to wipe the metadata. A free, small app called Document Metadata Cleaner will help you achieve this.
It's hard to remember life without ATMs. In Hong Kong, we can transfer funds, pay our utility bills and even settle tax demand-notes using an ATM. And they even dispense cash.
Two U.S. lawmakers plan to reintroduce a controversial cybersecurity bill that allows private companies to share customers' personal information related to a wide range of cyberthreats with government agencies.
Our manager's data loss prevention tool flags some incriminating keywords that lead to discovery of a possible criminal conspiracy.