Many members of Britain's Parliament regularly use technology - and tech firms - as a scapegoat for intractable social issues or failed government policies. Does the country's new mass surveillance law now enshrine technology scapegoating into law?
Cyberattacks waged by organized crime groups are simultaneously targeting a wider array of industries worldwide, which is why cross-industry threat information sharing is more critical than ever, says Brian Engle, executive director of the Retail Cyber Intelligence Sharing Center.
Britain has enacted a new mass surveillance law - the Investigatory Powers Act - which will allow the government to demand backdoors from tech companies to intercept communications. But at what cost?
The Internet Archive, a pioneering 20-petabyte digital repository, is raising funds to replicate its data in Canada. The group's founder fears that the election of Donald Trump as the next U.S. president portends an uncertain privacy rights future.
ISMG's upcoming Breach Prevention Summit in New Delhi shares steps for creating a cybersecure environment, as experts will discuss new approaches to tackle breaches and issues related to national critical infrastructure.
Score one for preparation: In the wake of a ransomware attack that infected 900 workstations, the San Francisco Municipal Transportation Agency says it's restoring affected systems, vowing to not give the attackers a single bitcoin of their ransom demand.
The U.S. Navy is set to begin notifying more than 130,000 current and former sailors that their personal information was "accessed by unknown individuals" after a Hewlett Packard Enterprise Services employee lost a laptop.
After the recent compromise of 3.2 million debit cards details in India, Ravi Shankar Prasad, minister of IT and law, is calling for more organizations to have a third-party security audit and hire a CISO.
IBM will pay an unspecified amount to the Australian government for the vendor's role in the technical problems related to the recent online census, which dented public confidence in large-scale IT projects.
A lack of incident response planning often leads to an unanticipated series of serious consequences for organizations that experience data breaches, Joey Johnson, CISO of Premise Health, says in this video interview.
A group of respected computer scientists has caused a stir by calling for an audit of U.S. presidential election results in three states, to disprove that hackers somehow altered the results.
Cybercriminals broke into the payment card processing system used by the Madison Square Garden Co., owner of Radio City Music Hall and other iconic entertainment venues, harvesting payment card details for nearly a year.
Three Mobile, one of the largest U.K. mobile providers, saw more than 132,000 accounts breached in a scam in which fraudsters ordered new devices for customers and then tried to intercept the deliveries.
Adobe will pay a small financial penalty to 15 states to resolve consumer protection and privacy claims following a data breach that affected 38 million active user accounts. The company's legal fees associated with the incident are likely far higher than the settlement amount, experts say.
Prolific hacker Samy Kamkar's latest creation shows how even locked computers can be hacked quite easily, providing further justification for security leaders to block users' computer USB ports.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.