A number of U.S. states are jointly investigating a data breach involving a subsidiary of Experian Plc that exposed the social security numbers of 200 million people.
McAfee Labs collected 2.47 million new mobile malware samples in 2013, with 744,000 in the last quarter alone.
April 1, 2014
The mobile malware “zoo” totaled 3.73 million samples at the end of the year. According to McAfee Labs Threats Report, Fourth Quarter 2013, malware can arrive on a mobile device through just about every attack vector, such as downloaded apps, malicious website, spam, malicious SMS messages, and malware-bearing advertisements.
What could this mean for the banking and finance industry?
April 1, 2014
A recent study shows that 95 percent of American bank ATMs still run on Windows XP, but Windows is discontinuing support (including security updates) of the XP operating system as of April 8, 2014.
The United Kingdom has launched a new cyber security system called the Computer Emergency Response Team (CERT-UK) to deal with incidents of national significance, including threats to the government, industry and academia.
Changing your organizational culture is the key to aggressively protecting your stakeholders’ information – how can involving your C-Suite make all the difference?
In February, a crowd of cybersecurity professionals attended the RSA Conference in San Francisco.
April 1, 2014
Kent Lawson, founder of Private WiFi, decided to test the wireless network provided at the RSA Conference, and he was surprised at the large amount of completely unprotected communications from security professionals, discovered in a mere 15 minutes.
The 2014 RSA Conference this February in San Francisco highlighted the theme of “Threat Intelligence.”
April 1, 2014
Security intelligence and changes in the nature of security risk were driving conversations and solutions at the 2014 RSA Conference – What will your C-Suite want to know?
Corporate executives can develop enough expertise to comfortably navigate key cybersecurity risk management concepts
April 1, 2014
The National Institute of Standards and Technology’s cybersecurity framework is now available, so how can CSOs and CISOs use it to better frame their cyber efforts and prove their case to the C-Suite?