Researchers Examine Ways to Protect Power Grids From Hackers February 14, 2017 Reliability measures of electrical grid has risen to a new norm as it involves physical security and cybersecurity. Threats to...
McAfee: Cyber Criminals to Target Cloud Technology, IoT Systems January 11, 2017 By Denise Johnson Hackers are expected to take advantage of vulnerabilities associated with cloud technology and the Internet of Things, according to McAfee...
“Hacker Lab” Event Shows How Cyber Criminals Attack Homes November 16, 2016 At a “Home Hacker Lab” event sponsored by Hartford Steam Boiler (HSB), part of Munich Re, and Prescient Solutions, an...
Wells Fargo: Private Data Loss More Concerning to Businesses Than Hackers September 12, 2016 With network security top of mind, businesses are nearly two times more concerned with losing private data (47 percent )...
Hotels in 10 States and DC Likely Hit by Hackers August 17, 2016 An undisclosed number of people who used credit cards at 20 Hyatt, Sheraton, Marriott, Westin and other hotels in 10...
Hackers Selling Access to 70,000 Company Computer Systems June 15, 2016 By Ilya Khrennikov Cybersecurity firm Kaspersky Lab says it has uncovered an online marketplace where criminals from all over the world sell access...
Terrorists Could Target Connected Cars April 14, 2016 Internet-connected and driverless cars could be targets for hackers – potentially including terrorists and hostile nations – so the automotive...
Government Health Insurance Website Logged 316 Cybersecurity Incidents March 25, 2016 By RICARDO ALONSO-ZALDIVAR The web portal used by millions of consumers to get health insurance coverage under President Barack Obama’s law logged 316...
Bank Heist by Hackers Reveals Weak Spots in Bangladesh Finance Safeguards March 21, 2016 By TERESA CEROJANO The laundering through the Philippines of $81 million stolen by hackers from a U.S. Federal Reserve account is adding to...
Increased Cyber Security to Come From Public, Private Collaboration January 25, 2016 “We are not going to be able to successfully overcome a cyber threat without enlisting the support of the private...