A vulnerability in Netgear-branded ethernet switches could give an attacker full access to the hardware.
Browsing Category: Compliance
The system that’s used to produce RFID-enabled identification cards–including permanent resident IDs–by the United States Citizenship and Immigration Service has a number of serious security issues, according to a new report from the Office of the Inspector General at DHS. Among the issues the OIG found is that nearly all of the workstations in the system[…]
Google took steps toward compliance with a European privacy ruling that allows individuals to request their names be removed from search results.
In March I spoke at Cyber Intelligence Asia 2014, where CERTs from most Asians countries were presented. The fact is that only a few CERTs are now dealing in some way with industrial security, ICS and SCADA matters. One of the best of those is CERT of Japan, which is doing a great job here,[…]
The burgeoning evolution of “Internet of Things” has prompted Cisco to issue a challenge to programmers to address these security issues before they go on to become bigger problems.
Dennis Fisher talks with Bruce Schneier about the differences between bulk and targeted surveillance, the most concerning NSA revelations and making surveillance more expensive for intelligence agencies. Download: digital_underground_145.mp3
New report shows that health care industry intellectual property, payment information, and patient data are poorly protected and, in many cases, already compromised.
BlackBerry this week released a new set of privacy guidelines its encouraging third-party app developers to follow to better protect their customers.
Steve Adegbite of Wells Fargo stressed that the idea of operational risk assessment and management is perhaps the most important aspect of organizational security.
A Cambridge University study examined the effectiveness of malware warnings, and urged those alerts be overhauled and written in concrete, specific language.