Security researchers said they found a vulnerability in the Google Inc mobile payments platform which is currently available in phones sold by Sprint Nextel Corp.
More than half of Federal employees use at least one mobile device at work, a CDW-G survey found, and many are using personal devices to accomplish work-related tasks.
The UK and the US have better defenses against cyberattacks than China, partly because they have better internal data-sharing practices, according to a McAfee report.
IN.gov, the official website of the state of Indiana, and Indiana Attorney General Greg Zoeller launched an Identity theft Prevention Toolkit in an effort to aid Hoosiers in protecting themselves against identity theft through education, detection practices, and corrective procedures.
Mobile technology security threats, social media, "hactivism" and more will be at an all-time high in 2012, according to an annual security forecast by the Cyber Security and Information Assurance Division of Kroll Inc.
Booz Allen Hamilton has cited increased cyber threats to senior executives, the impact of organized crime and mobile device security as among the Top 10 Financial Services Cyber Security Trends that will make 2012 a pivotal year for banks and investment firms.
In legislation introduced this week, the U.S. government and companies would be encouraged to share information about cybersecurity threats and hacker attacks.
The process of notifying affected populations in the event of a data breach is complex and littered with potential land mines – handled poorly, the notification can be a black eye for an organization and potentially open them up to regulatory fines or sanctions. Brian Lapidus and his team at Kroll have assembled the following advice for businesses to help them minimize their risk and simplify what has become a very challenging process.
The increasingly sophisticated systems running a car may lead to new vulnerabilities, according to a study from security software provider McAfee in partnership with mobile software provider Wind River and embedded security provider Escrypt. Those systems could allow hackers to take control of the car, track its location, and even access devices that are connected to it, including smartphones and tablets carrying valuable personal data.