An Obama-era regulation, which has yet to take effect, that aims to strengthen consumer's online privacy may be derailed. The Senate has voted along party lines to quash the rule that the FCC issued in October.
Cloud services firm Coupa is one of the latest business email compromise victims, after a fraudster pretending to be its CEO faked out the HR department and stole all of its 2016 employees' W-2 forms. Security experts say rigorous training remains the only viable defense.
Don't trust the internet of things to maintain common-sense boundaries - or your privacy - as evidenced by a lawsuit against "sensual lifestyle products" manufacturer We-Vibe, alleging that its products tracked customers' usage patterns, indexed by their email addresses.
Vice President Mike Pence used a personal AOL email account while governor of Indiana to conduct official business, and his account was hacked. Live by the private email account, die by the private email account?
Easy Solutions' Ricardo Villadiego addresses how the digital revolution, millennials and the widespread use of online communications affect financial fraud.
In this transcript from his video interview at RSA Conference 2017, Villadiego:
Explains why banks are not proactive when it comes to fraud protection;...
Déjà vu "smart toy" information security fail: Spiral Toys, maker of internet-connected CloudPets, is under fire for exposing 821,000 user records online - now being ransomed - as well as links to 2.2 million parents' and children's voice recordings.
Today's threat landscape constantly throws new problems at organizations already struggling to keep up with yesterday's issues. New malware, ransomware, botnets, and fileless attacks target a growing list of enterprise vulnerabilities with clever new exploits and social engineering tactics, and these attacks are...
What's required to access the Dark Web? And how does one separate fact from fiction? These are two of the five things Dark Web users need to know, says Danny Rogers, co-founder and CEO of Terbium Labs.
Paid breach notification site LeakedSource has disappeared. Given the site's business model - selling access to stolen credentials to any potential buyer - breach notification expert Troy Hunt says the site's demise is no surprise.
Terbium CEO Danny Rogers on How to Search for Your Organization's Data, interviewed by ISMG's Vice President of Editorial, Tom Field
What's required to access the Dark Web? And how does one separate fact from fiction? These are two of the five things Dark Web users need to know, says Danny Rogers, cofounder and CEO...
Information Security Media Group has a team of editors covering RSA Conference 2017. What are the hot topics from the show floor? Who are the key thought leaders on camera in ISMG's video studio? See and hear highlights from the first two days of the event.
Televisions that spy on their users have long been a trope of dystopian fiction, including George Orwell's "1984." But the spying TV appears to be far from fictional, according to a new settlement agreement reached between the FTC and smart-TV maker Vizio.
Google plans to appeal a court order to comply with search warrants asking for account information stored outside the U.S. The ruling comes as Microsoft recently prevailed in a similar case, creating legal ambiguity.