Fraudsters recently ordered a total of nine iPhones and Samsung S8s from Sprint and Verizon with my personal details. With the internet awash in stolen personally identifiable information, are mobile operators doing enough to prevent fraudulent orders?
It's been seven years since Dale Nordenberg, a pediatrician, became involved in the drive to improve medical device security. What progress does he see among manufacturers, government agencies and healthcare providers?
The desire to gain a competitive edge is beginning to drive security investments among companies in the region, says Nigel Ng, vice president, Asia Pacific and Japan, for RSA.
To better address security issues, companies in the manufacturing industry need to ensure proper communications between their operational technology and information technology specialists, says RaviKiran Avvaru, head of IT at Toyota Kirloskar.
When it comes to privacy, India faces many challenges, including the need to reduce the amount of time it takes to resolve privacy-related cases, says Vicky Shah, advocate, cyber law and data protection.
In an information technology environment where personnel are taking on increasingly complex responsibilities, the key to ensuring security is still awareness training, says former U.S. CISO Gregory Touhill, who says he'd put his last dollar on it.
A British teenager has avoided jail time after pleading guilty to thousands of DDoS disruptions against Amazon, Netflix, NatWest Bank and others. Separately, a U.S. man has pleaded guilty to launching DDoS attacks on behalf of Lizard Squad and PoodleCorp, among other offenses.
To counter nation-state cyberattacks, India needs to take cybersecurity beyond the responsibility of individual agencies, says former Navy officer Cdr Mukesh Saini, head of IT security at Essel Group.
Kaspersky Lab has sued the U.S. Department of Homeland Security for issuing an order that bans the Moscow-based anti-virus firm's software from being used on federal systems, saying DHS violated the company's right to respond to the allegations against it.
The Trump administration has belatedly announced that hackers tied to the government of North Korea were behind the WannaCry ransomware outbreak that began in May and infected more than 200,000 endpoints across 150 countries. Why is the White House only now airing its attribution?
Bitcoin-seeking phishing attacks have been trying to socially engineer would-be cryptocurrency exchange executives, warn researchers at Secureworks. The attacks use Word documents with malicious macros and control code previously seen in attacks launched by the Lazarus Group, which has been tied to North Korea.
Bitcoin's massive rise in value and hype continues to draw the attention of hackers, scammers and organized crime. Flaws in bitcoin mining firmware and hacks of wallet software show that the infrastructure associated with cryptocurrency is not always well-secured.
Most of the criminal activity targeting today's enterprises originates at the endpoint, and the majority of modern breaches use known threats or vulnerabilities for which a patch already exists. For this reason, endpoint visibility must be complete and continuous.
The latest ISMG Security Report focuses on the significant changes found in the latest version of the U.S. government's Framework for Improving Critical Infrastructure Cybersecurity, commonly known as the NIST cybersecurity framework. NIST seeks comments from stakeholders on the draft of version 1.1 of the framework...
Organizations should take an "inside-out" approach to mitigating the insider threat, says Brandon Swafford of Forcepoint, who explains the components of that approach in an in-depth interview.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.