Eighty percent of the Android ecosystem - an estimated 1.4 billion devices - is vulnerable to an attack affecting TCP. While the flaw has been patched in Linux, Android remains vulnerable, although Google is aware of the issue.
USB devices and ports pose serious risks, and they aren't going away anytime soon. But researchers say they've developed a way to block malicious actions by USB devices to help prevent attacks such as "BadUSB."
Medical device cybersecurity must be recognized as a critical public health issue so that all segments of the healthcare sector understand their roles in addressing the many complicated challenges involved, says Dale Nordenberg, M.D., of the Medical Device Innovation, Safety and Security Consortium.
The risk of cyber fraud is increasing faster than the total volume of financial transactions across the internet. In just two years, internet transactions increased by 200%, while fraud increased 178%...and that was exclusively in the mobile channel. Is fraud becoming better business than the business itself?
The creation of sophisticated inventory systems is critical to ensuring the security of an organization's diverse medical devices, says Dale Nordenberg, M.D., who heads a medical device security consortium. Learn about the group's latest efforts in this arena.
Are You Testing for the Real World?
While seemingly subtle, the difference between emulation and simulation are crucial when it comes to ensuring realistic testing with reliable, repeatable results.
In order to have confidence in your systems, you need to continually test and monitor them with realistic...
A report on FBI Director James Comey seeking to reopen the debate over creating for law enforcement a bypass to encryption on mobile devices is among the stories featured in the latest ISMG Security Report.
The European Commission's Payment Services Directive II, or PSD2, stands to revolutionize the payment industry. In addition to driving innovation and competition, the new regulation calls for a new generation of customer security.
As the volume of financial transactions in remote channels increase, so does the...
Too many organizations have too many disjointed security controls, says Vijay Bharti, Vice President and Head of the Security Unit at Happiest Minds. What do they need? In this interview, Bharti talks about the pressing need for an integrated cybersecurity approach that includes analytics, machine learning and a...
As Democrats gather in Philadelphia to nominate Hillary Clinton for president, it's a good time to examine the former secretary of state's positions on cybersecurity and online privacy. Here's where she stands.
As the Pokémon Go craze continues to take off, it's clear that when it comes to chasing virtual creatures through real-world locations, too many people fail to keep some common sense guidelines in mind.
Mobile health applications, wearable fitness trackers and even social media sites are creating new privacy risks for health information because the data collected, shared and used falls outside the regulatory scope of HIPAA, says Lucia Savage of the Office of the National Coordinator for Health IT.
In just two years' time, RSA analysts have seen a 170 percent rise in incidents of fraud via the mobile channel. What's behind the spike, and what can security leaders do to help their organizations and customers curb fraud losses?
All fraud hurts, but when compared to other instruments and transaction channels, nothing has the potential to hurt like check deposit fraud. Account take over is still a major problem in the banking industry, and with recent mass compromise events, the risk is on an upswing.
Download this infographic to...
Security firms are warning that they've seen a spike in infections tied to a virulent strain of trojanized Android adware called Shedun - a.k.a. HummingBad - that can root smartphones, survive factory resets and earn cybercriminals big money.