FBI Director James Comey worries about data corruption, and he's focused on hackers altering data. But if government leaders feed false information into computer systems, what should IT and IT security practitioners do to protect data integrity?
Vice President Mike Pence used a personal AOL email account while governor of Indiana to conduct official business, and his account was hacked. Live by the private email account, die by the private email account?
For any of the tens of thousands of organization that may be smarting from this week's Amazon Web Services and Simple Storage Solution (S3) outage, take the following advice to heart: "You must kill your darlings."
Déjà vu "smart toy" information security fail: Spiral Toys, maker of internet-connected CloudPets, is under fire for exposing 821,000 user records online - now being ransomed - as well as links to 2.2 million parents' and children's voice recordings.
The Russian government appears to be doubling down on its information warfare success to date, publicly confirming that it has a "cyber army" designed to wage psychological operations and propaganda campaigns. While there are defenses, too few are using them.
What's required to access the Dark Web? And how does one separate fact from fiction? These are two of the five things Dark Web users need to know, says Danny Rogers, co-founder and CEO of Terbium Labs.
Paid breach notification site LeakedSource has disappeared. Given the site's business model - selling access to stolen credentials to any potential buyer - breach notification expert Troy Hunt says the site's demise is no surprise.
New ransomware circulating via BitTorrent is disguised as software that purports to allow Mac users to crack popular Adobe and Microsoft applications. Separately, new ransomware calling itself Trump Locker appears to be the previously spotted VenusLocker ransomware in disguise.
Information Security Media Group has a team of editors covering RSA Conference 2017. What are the hot topics from the show floor? Who are the key thought leaders on camera in ISMG's video studio? See and hear highlights from the first two days of the event.
Televisions that spy on their users have long been a trope of dystopian fiction, including George Orwell's "1984." But the spying TV appears to be far from fictional, according to a new settlement agreement reached between the FTC and smart-TV maker Vizio.
Google plans to appeal a court order to comply with search warrants asking for account information stored outside the U.S. The ruling comes as Microsoft recently prevailed in a similar case, creating legal ambiguity.
Blockchain, the distributed ledger technology for cryptocurrency, has the potential to improve the privacy and security of health information exchange, says Shahram Ebadollahi, vice president of innovations at IBM Watson, which is collaborating with the FDA on a research project.
European officials are asking the United States if the EU-U.S. deal for sharing personal information among businesses - dubbed the Privacy Shield - should be considered null and void as a result of an executive order issued by President Donald Trump.