cyber security News

4 in 10 Midsize Businesses Have Experienced A Data Breach

Most midsize business leaders view a data breach among their top risks and a majority consider IT security ‘very important’ when selecting a supplier, according to The Hartford’s survey of midsize business owners and C-level executives. They have good reason …

Cyber, Supply Chain Lead UK Survey of Top P/C Insurance Risks

Demand for cyber security coverage from insurance buyers ranks number one among several emerging risks, according to a recent survey undertaken by RKH Specialty, a London-based specialty lines broker. Insurance professionals indicated that for property coverages, supply chain disruption is …

Hacker Case Points to Deeper Plane Safety Issues

Security researcher Chris Roberts made headlines last month when he was hauled off a plane in New York by the FBI and accused of hacking into flight controls via his underseat entertainment unit. Other security researchers say Roberts – who …

Hacker’s Claims Spotlight Vulnerabilities of Jetliners’ Systems

Even as the U.S. questioned a computer researcher’s claims of tampering with a jetliner in flight, his account spotlighted possible cybersecurity risks in commercial aviation. The consultant told the Federal Bureau of Investigation that he hacked into in-flight networks more …

Security Companies Hire Hackers, Ex-Spies to Fight Cyber Attacks

It’s a seller’s market for the cyber war’s special forces. Just ask Scott Davies, 30, who left a career snooping on Australia’s enemies in December for a similar gig at FireEye Inc. Or Brian Varner, 35, who swapped a job …

Studies Reveal User Mistakes Aid Most Cyberattacks

When a cyber security breach hits the news, those most closely involved often have incentive to play up the sophistication of the attack. If hackers are portrayed as well-funded geniuses, victims look less vulnerable, security firms can flog their products …

Federal Agency Outlines Common Cyber Threats and Risk

While cybersecurity threats are constantly evolving, many cyber criminals use variations of the same methods of cyber attack. Specifics of these attacks may differ, but the nature of the attacks stay the same. Cyber criminals take advantage of a user’s …

Understanding the Swinging Pendulum That is Data Breach Law

In today’s technology-driven economy, organizations of all sizes are exposed to increasingly complex computer security risks. The evolving sophistication of the hacking community only increases the likelihood of a targeted cyber-attack and forces companies to recognize the importance of protecting …

After Sony Attack FBI Warns of ‘Destructive’ Malware

The Federal Bureau of Investigation warned U.S. businesses that hackers have used malicious software to launch a destructive cyberattack in the United States, following a devastating breach last week at Sony Pictures Entertainment. Cybersecurity experts said the malicious software described …

University Releases 2015 Emerging Cyber Threats Report

In its latest Emerging Cyber Threats Report, Georgia Tech warns about loss of privacy, abuse of trust between users and machines, attacks against the mobile ecosystem, rogue insiders and the increasing involvement of cyberspace in nation-state conflicts. Such topics are …