A lawsuit accuses Google of "the surreptitious location tracking of millions of mobile phone users." The legal action was sparked by a report demonstrating that some Google apps tracked and time-stamped users' locations even if a user deactivated the "location history" setting.
A messy insider incident - allegedly involving an elected official in Wisconsin who is suspected of installing keylogging software to inappropriately access county systems over a five-year span - has impacted more than 258,000 individuals.
It's déjà vu "FBI vs. Apple" all over again, as Reuters reports that the Justice Department is seeking to compel Facebook to build a backdoor into its Messenger app to help the FBI monitor an MS-13 suspect's voice communications.
Augusta University Health in Georgia says it just recently concluded that a phishing attack that occurred - and was detected - 10 months ago resulted in a breach potentially exposing information on 417,000 individuals. Security experts are questioning why the breach determination took so long.
Malware detection needs to shift to detecting anomalous behavior, rather than depending on signature-based detection technologies to deal with such threats as sandbox-evading malware, says Verizon's Ashish Thapar.
While IT and OT integration has brought about new levels of operational efficiency, it has also introduced serious cyber risks that conventional IT security approaches might fail to address, says IBM Security's Paul Garvey.
Cyber security statistics in 2016 paint a bleak picture. Unpatched vulnerabilities proliferate. Attackers weaponize new exploits 3x faster than just a few years back.
The attack surface continues to expand as shadow IT abounds, and non-traditional platforms, like cloud/virtual, mobile, and IoT, are becoming...
Discover Scenarios and Solutions for Privileged Password Management
The use of stolen credentials ranked as the number one action variety in data breaches in 2017 (source: 2018 Verizon Data Breach Investigations Report), and organizations continue to make it easy for attackers.
For instance, many IT...
Over the past year, financial services organizations have seen an 87% increase in credential leakage, 149% increase in stolen credit cards, 151% increase in cyberattack indications and 49% increase in fake social media accounts. In addition, state-sponsored APT groups (with little to no financial motivation) have...
IT's relevance is driven by its ability to become smarter and better aligned with the transformation needs of the business.
Download this whitepaper to learn how Splunk IT Service Intelligence can help you drive technology enablement and innovation into business process and operations, as well as monitor and manage...
There's a rush to cloud services, and that can offer security benefits. But it can be difficult to keep track of data and classify it in the cloud, says Neil Campbell of Telstra, a telecommunications company.