A judge finds WikiLeaks leaker Bradley Manning not guilty of aiding the enemy but convicts him on other charges. How will the mixed verdict sway NSA whistleblower Edward Snowden's decision on whether to remain on the lam?
The National Institute of Standards and Technology has published new guidance on malware incident prevention and handling for desktops and laptops as well as enterprise patch management technologies.
How were four Russians and a Ukrainian allegedly able to steal more than 160 million payment card numbers from corporate networks over seven years? An indictment announced by U.S. Attorney Paul J. Fishman provides details.
By being transparent, federal government agencies can minimize public concern that government monitors individual speech and action on social media, new guidance from the U.S. federal CIO Council advises.
The author of the forthcoming book "Secrets and Leaks" explains why the acts of NSA whistleblower Edward Snowden don't carry the same weight as those of Pentagon Papers leaker Daniel Ellsberg.
The National Institute of Standards and Technology issues a revision to the digital standard used to ensure the integrity of electronic documents and the identity of the signer.
IT security pros see metrics as a useful tool to validate operational performance. But many organizations' top leaders evaluate security on cost. It's time to bridge that gap.
What are the emerging security vulnerabilities for mobile devices? Anti-phishing expert Dave Jevans provides insights based on new mobile threat research.
Izz ad-Din al-Qassam Cyber Fighters says more DDoS attacks against U.S. banks are on the way. This fourth campaign will be "a bit different," the group says. Learn what experts expect.
Organizations increasingly engage with customers via social media, but managers often fail to incorporate or enforce key policies. Attorney David Adler offers tips to improve social media management.
As social media use grows, so do the risks of organizations getting caught up in costly legal disputes over ownership and assets. Alan Brill of Kroll advises on how to mitigate such risks.
The apparatchiks at the Kremlin think they're clever sorts with plans to replace computers with typewriters to prevent the American e-spies at the National Security Agency from hacking into Russian intelligence systems.
Organizations could choose to add iris images as an alternate biometric over fingerprints on personal identity verification cards, because, for some users, fingerprint collection can be difficult.
Angered over the Edward Snowden revelations, DEF CON says the feds should take a 'time-out' from this year's hackers' conference. But a top DHS cybersecurity policymaker says he's still invited to participate in a conclave panel discussion.
The recent firings of six workers at Cedars-Sinai Medical Center offers yet another reminder for health records snoopers everywhere: Curiosity kills your job.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.