The Australian government aims at giving itself the power to manage the response of private enterprises to cyber attacks on critical infrastructure. The Australian government wants to ...
As time passes, state-backed hacking is becoming an increasingly bigger problem, with the attackers stealing money, information, and more!
The $80 million Capital One must pay the US Treasury for its cloud-related cybersecurity issues is pocket change for the bank. The compliance actions the bank--and other banks--will be ...
Binary Defense researchers have identified a bug in the Emotet malware and have been using it to prevent the malware from making new victims.
Late in the summer of 2016, Xu Yuyu received a call that promised to change her life. Her college entrance examination scores, she was told, had won her admission to the English department ...
The CJEU has just declared the EU-US Privacy Shield invalid - now what?
When it comes to early-stage startups and cybersecurity, the two concepts do not always go hand-in-hand. In this write-up, we'll explain the importance of cybersecurity and how it will ...
Exclusive: in some cases Google did not necessarily ban users who were often threatening violence or expressing extremist views
In a drill this week that drew some 2,000 participants, the DHS tested the ability of companies in the health care, manufacturing and other key sectors to withstand hypothetical hacking ...
Hiroshi Kodama, executive vice president, CIO and CISO at NEC speaks at NEC headquarters in July. NEC has transformed its Tokyo headquarters into a smart
To understand the various implications of the AI phenomenon, we spoke with Krishna C. Mukherjee - information technologist, who introduced AI technology at Microsoft. He tells us eight ways ...
In the wake of a stalemate between the airplane manufacturer and a security researcher over vulns found in its 787 aircraft's network, Boeing says it's ready to embrace the hacker community.