Facebook has confirmed that unprotected databases containing more than 419 million users' phone numbers contained data scraped from the social network. TechCrunch, which first reported on the development, says many of the exposed phone numbers can be tied to Facebook IDs and remain accurate.
A widely used brand of GPS location-tracking devices - for keeping tabs on children, elderly relatives and pets - have security flaws that could allow anyone with an internet connection to track the devices' real-time location and historical movements, warns security firm Avast.
Cyber defense is no longer about staying a step ahead - it's about trying to remain no further than a step behind the adversaries, says Moshe Ishai of HolistiCyber, who shares insights on how to regain an advantage.
At Citi nearly 25 years ago, Steve Katz was named the world's first CISO. Today he remains active in the field and has a unique perspective on how the CISO role has evolved - and what it will take to be a cybersecurity leader in the future.
In just a few years' time, deception technology has matured to become a critical - and recommended - element of fundamental cybersecurity defense. Tony Cole, CTO of Attivo Networks, discusses critical success factors for deploying deception.
How do organizations know if their app and network security is sufficient to protect them from data breaches - or if their defenses are even working? Paul Dant of Arxan talks about the evolution of mobile/web app security.
The cloud, artificial intelligence and security as a service - these are the three critical conversations that security leaders need to be having with their business counterparts, says Oscar Chavez-Arietta, vice president, Latin America, at Sophos.
In the wake of the HSBC money-laundering scandal, whistleblower Everett Stern founded the intelligence firm Tactical Rabbit. He explains the firm's mission and how the HSBC experience continues to drive him forward.
Google will pay a $170 million fine to settle allegations that its YouTube subsidiary illegally collected personal information about children without their parents' consent, according to the Federal Trade Commission. But some children's right groups and members of Congress say the penalty is far too low.
Kenneth Currin Schuchman, 21, who authorities charged with co-creating the massive Satori botnet that was used to wage several large-scale DDoS attacks, pleaded guilty Tuesday to a single federal charge.
The battle between Huawei Technologies and the White House continues to intensify, with the Chinese manufacturing giant accusing the U.S. of "using every tool at its disposal" to disrupt its business, including cyberattacks and employee intimidation.
An extraordinary iPhone hacking campaign revealed by Google last week may be linked to other Android spying campaigns focused on websites related to the Uyghurs, a Chinese Muslim minority group, and the East Turkistan region of China, according to new research from Volexity.
Deploying deception technology can give organizations a leg up when it comes to more quickly spotting and responding to data breaches, provided they configure and utilize the technology appropriately, says Rocco Grillo of the consultancy Alvarez & Marsal.
For many cybercrime investigators, it's all about finding indicators of compromise - evidence a crime has been committed. Sam Curry of Cybereason describes the value of making a shift to cataloging indicators of behavior.
Nation-state actors, cybercriminals, hacktivists - each of these adversaries poses threats to enterprises. But how can organizations prioritize the threats and respond based on business risks? Craig Harber of Fidelis Cybersecurity discusses advanced threats and how to raise the bar on response.