The release of the list coincides with the issuance of the Common Weakness Scoring System that allows software makers to identify vulnerabilities in their programs and buyers to determine software they acquire is secure.
In a case weighing privacy vs. free speech, the U.S. Supreme Court has struck down a Vermont law that requires physicians to give their consent before information about their prescription-writing habits can be sold to help market prescription drugs.
Police in Beaverton, Ore., have asked for the public's help to identify four suspects who were caught on camera using fake payment cards allegedly created from details skimmed by fraudsters at area Michaels stores.
Banks need to take a proactive approach toward improving their business continuity planning, and that includes updating services and evaluating business-impact assessments, says Donald Saxinger of the FDIC.
The House Cybersecurity Task Force will examine and make recommendations on cybersecurity authorities, public-private information sharing, critical infrastructure and domestic legal frameworks as well as evaluate the Obama administration's cybersecurity proposal.
Federal officials should offer detailed guidance on how to conduct a "risk of harm" assessment to comply with the HITECH Act Breach Notification Rule, says Harry Rhodes, director of practice leadership at the American Health Information Management Association.
"It's not enough to know the architecture of the breach system," says Michael Aisenberg of MITRE Corp. "Leaders have to understand the different jurisdiction of where they do business, where their customers are and which breach law applies."
Building on existing contactless NFC technology could bridge the gap between the mag-stripe and chip and PIN. And the Smart Card Alliance says merchants should begin investing in infrastructure upgrades now.
The Office of the National Coordinator for Health IT will soon seek feedback on using certain existing standards for metadata for specific purposes, such as to indicate a patient's privacy preferences, within electronic health records. ONC will then consider the comments before deciding whether to require the use of...
The new orders, signed a month ago by President Obama, detail when the military must seek presidential approval for a specific cyberassault on an enemy and weave cyber capabilities into U.S. war fighting strategy, the AP reports.