To better battle ransomware, we must take a page from the lessons learned by the kidnapping and ransom insurance industry in its battle against piracy in the Indian Ocean, Jeremiah Grossman told the AppSec Europe conference in Belfast, Northern Ireland.
President Donald Trump has signed a long-awaited executive order that places responsibility for cybersecurity on departmental secretaries and agency directors and emphasizes the use of risk management throughout the federal government to secure digital assets.
A focus on breach prevention and protecting the perimeter is outdated, so organizations need to shift to a focus on resiliency, says security thought leader Vishak Raman, former senior regional director for India and SAARC at FireEye.
The cybersecurity epitaph of the fired FBI director could read: "He showed courage to take on Apple." Comey publicly battled Apple CEO Tim Cook over unlocking the iPhone of the San Bernardino shooter, becoming the face of the proponents who seek ways to bypass encryption on mobile devices.
Police are investigating an anonymous email threat against Indian IT company Wipro as a potential "act of terror." On May 5, the company received an anonymous email threatening a massive attack with the poison Ricin on all its offices in Bangalore if it didn't pay a bitcoin ransom.
President Donald J. Trump has fired FBI Director James Comey, a divisive figure who led the law enforcement agency through an unprecedented presidential campaign tainted by Russian hacking and an investigation into Hillary Clinton's handling of classified emails.
Hot sessions at this week's OWASP AppSec Europe 2017 conference in Belfast, Northern Ireland, cover everything from the EU's General Data Protection Regulation and fostering better SecDevOps uptake, to quantum-computing resistant crypto and ransomware economics.
Who in the world could have attempted to mess with this past weekend's presidential election in France via a well-timed dump of campaign documents and communications from the campaign of Emmanuel Macron? Security experts say all evidence points to the usual suspect: Russian hackers.
Reporting software vulnerabilities can be legally dicey, particularly if the affected company has not previously had contact with computer security researchers. A Sydney consultant recently experienced both ends of the spectrum while investigating building management software.
The UAE Banks Federation, which has 49 member banks, has launched the Cyber Threat Intelligence Initiative 2017 to create an information sharing platform in an attempt to better detect and respond to cyberattacks. But are these banks ready to share information or report breaches?
The critical Active Management Technology flaw in many Intel chipsets' firmware can be remotely exploited using any password - or even no password at all - to gain full access to a system, security researchers warn. Numerous systems and even ATMs will require forthcoming firmware fixes.
The latest draft version of the Trump administration's cybersecurity executive order is similar to the previous version and lays out a plan to secure U.S. federal government and critical infrastructure IT that could have come out of the Obama White House.
With an aim to safeguard capital markets from cyberattacks, the Securities and Exchange Board of India has set up a committee on cybersecurity to provide guidance. But some security practitioners stress that the panel will prove effective only if its recommendations are actually carried out.