Stories by Jaikumar Vijayan

There's still a security disconnect on BYOD

Corporate employees are taking a surprisingly lax approach towards security issues raised by the business use of personally owned mobile devices.

By Jaikumar Vijayan | 12 July, 2014 03:12

Tags: Webroot, Bring Your Own Device (BYOD), security, privacy, Harris Interactive

New docs show DHS was more worried about critical infrastructure flaw in '07 than it let on

The Department of Homeland Security mistakenly released details on an experiment in which a 27-ton generator was destroyed via a cyberattack.

By Jaikumar Vijayan | 10 July, 2014 07:50

Tags: Cybercrime and Hacking, Gov't Legislation/Regulation, Department of Homeland Security, Google, cyberwarfare, regulation, government

NSA defends collecting data from U.S. residents not suspected of terrorist activities

The National Security Agency Monday defended its data collection practices amid revelations that almost 90% of the data it sweeps up involves ordinary Internet users not suspected of crimes.

By Jaikumar Vijayan | 08 July, 2014 06:34

Tags: National Security Agency, cyberwarfare, security, U.S. National Security Agency, nsa, washington post, Vine, privacy

Hackers hit more businesses through remote access accounts

Hackers recently broke into payment systems at several northwestern U.S. restaurants and food service firms via a remote access account belonging to one of their vendors, another example of the need for companies to monitor third-party access to their networks.

By Jaikumar Vijayan | 02 July, 2014 22:01

Tags: Cybercrime and Hacking, security, computerworld, logmein, Malware and Vulnerabilities

Critics blast Microsoft's takedown of No-IP domains

Microsoft's tactics in using a court order to seize nearly two-dozen domains it said were used to distribute Windows malware tools were called ham-handed by several critics.

By Jaikumar Vijayan | 02 July, 2014 21:28

Tags: Cybercrime and Hacking, Microsoft, legal, Malware and Vulnerabilities

Groups fear bill would allow free flow of data between private sector and NSA

A draft U.S. Senate bill aimed at making it easier for organizations to share cyber threat information poses serious threats to personal privacy, several rights groups said in a letter to Congress on Thursday.

By Jaikumar Vijayan | 28 June, 2014 06:28

Tags: Cybercrime and Hacking, American Civil Liberties Union, National Security Agency, cyberwarfare, security, Sena, intel, Electronic Frontier Foundation, privacy

Google's move into home automation means even less privacy

Plans by smart thermostat maker Nest Labs to share some customer data with corporate parent Google means the search engine giant will be fending off privacy concerns as it expands into home automation.

By Jaikumar Vijayan | 27 June, 2014 04:58

Tags: security, Emerging Technologies, hardware systems, logitech, internet, Internet Search, jawbone, privacy, search engines, whirlpool, Google

Rights groups applaud Supreme Court cellphone ruling

Privacy and civil rights groups lauded Wednesday's unanimous U.S. Supreme Court ruling that police must obtain a search warrant before searching through the contents of an arrested person's cellphone.

By Jaikumar Vijayan | 26 June, 2014 05:21

Tags: Gov't Legislation/Regulation, Mobile/Wireless, Networking, regulation, legal, wireless, government, mobile, U.S. Supreme Court

Security skills shortage is real, and it's not going away anytime soon

The current shortage of cybersecurity professionals in the U.S will likely resolve itself over the next several years, according to the RAND Corp. But until then, companies will find it disturbingly difficult to find skilled workers.

By Jaikumar Vijayan | 21 June, 2014 06:23

Tags: security, IT careers

Congressman calls for halt to FTC breach probe amid claims of 'corporate blackmail'

A U.S. House committee has called on the Federal Trade Commission's Inspector General to probe the agency's relationship with a peer-to-peer network-monitoring firm whose data is key evidence in an FTC complaint filed against LabMD.

By Jaikumar Vijayan | 20 June, 2014 05:05

Tags: Gov't Legislation/Regulation, Federal Trade Commission, regulation, security, legal, government, Gov't Legislation, LabMD

Bill to require warrant for email searches gains ground in House

A far-reaching bill that would require the government to obtain a warrant to search through people's emails and other online communications now has majority support in the House of Representatives.

By Jaikumar Vijayan | 19 June, 2014 20:15

Tags: Gov't Legislation/Regulation, National Security Agency, U.S. House of Representatives, regulation, security, government, privacy

Bank not liable for customer's $440,000 cybertheft

A Missouri escrow firm that lost $440,000 in a 2010 cyberheist cannot hold its bank responsible for the loss an appeals court said this week affirming a lower court's previous ruling on the issue.

By Jaikumar Vijayan | 19 June, 2014 05:46

Tags: Cybercrime and Hacking, choice, security, legal

Internet in Iraq suffers government-ordered shutdowns amid violence

In what's become a familiar pattern in recent years, the government in Iraq appears to have ordered major Internet shutdowns over the past few days amid escalating sectarian violence in the country.

By Jaikumar Vijayan | 14 June, 2014 06:10

Tags: Google, twitter, internet, Facebook, Renesys

US retailer Target finally gets its first CISO

US retailer Target has hired a new Chief Information Security Officer, a move that's noteworthy mainly because it is the first time the company has had anyone in this role -- even though it is one of the largest retailers in the U.S.

By Jaikumar Vijayan | 12 June, 2014 06:06

Tags: Target, IT transformation, retail, security, general electric, general motors, industry verticals

Most U.S. credit cards will have microchips by end of 2015

The long expected migration of the U.S. payment system to the Europay MasterCard Visa smartcard standard finally appears to be gathering steam.

By Jaikumar Vijayan | 11 June, 2014 06:09

Tags: security, visa, mastercard, encryption, Malware and Vulnerabilities

Twitter Feed

Featured Whitepapers