Ransomware is devastating, and current security software doesn't do a great job of stopping it. But researchers say ransomware's behavior - quickly encrypting large volumes of files before users have time to react - could be the key to solving this epidemic.
Pokémon Go - Nintendo's new smartphone app - has been a smash hit. But the game's augmented-reality approach, and app developers' data-handling choices, have triggered security and privacy concerns as well as safety warnings.
Deception technology is gaining prominence with top organizations around the world. As more practitioners join the active defense bandwagon, is your organization ready? Smokescreen Technologies' Sahir Hidayatullah shares some insights to get you going.
In the wake of the controversy over Hillary Clinton's use of private email servers, President Obama voices his concerns about the state of federal government IT security in this edition of the ISMG Security Report.
Google has launched a two-year Chrome trial aimed at safeguarding the Internet against quantum computers, which security experts predict will shred all data safeguarded using current crypto techniques.
Omni Hotels & Resorts is warning customers that for six months, hackers infiltrated its networks and used point-of-sale malware to steal payment card data. One security expert says more than 50,000 stolen cards have been sold by a hacker called JokerStash.
The release this week by the PCI Security Standards Council of a new PCI compliance resource for small merchants is being lauded by the banking and payments community. But how effective will the resource be at actually convincing merchants to move forward with PCI compliance?
Interbank messaging service SWIFT will begin collecting and sharing anonymized attack information and offering incident-response services - backed by Fox-IT and BAE Systems - to help hacked banks. But will financial institutions buy in?
A bitter battle flares up in the fiercely competitive endpoint protection products market, and uncovering the real impact over Hillary Clinton's email server. These items highlight this edition of the ISMG Security Report.
Deception technology could be a game-changer, with many thought leaders and organizations already getting behind the concept of "assume compromise." Smokescreen founder Sahir Hidayatullah speaks about the rise of this emerging technology.
Missing from the analysis and debate regarding the U.S. government's decision not to prosecute presumptive Democratic Party presidential candidate Hillary Clinton for using a private email server while secretary of state is this simple fact: Secure IT systems aren't tailored to function the way people behave.
Security vendors are issuing warnings about two new types of dangerous Mac malware - Eleanor and Keydnap - which serve as a reminder that it's not just Windows users coming under fire from malicious software developers and tricksters.
The Government of India is yet to appoint a Cyber Appellate Tribunal chair - but powers and functions have been prescribed. Meanwhile, cases pile up, and critics wonder when this vital role will be filled.
One of the core values of the cybersecurity framework is to facilitate communication among various stakeholders coming from different technical and managerial backgrounds who must collaborate to build secure IT systems, NIST Program Manager Matt Barrett explains in an interview.