Despite at least two decades of high-profile security incidents and data breaches, a recently released study has found that U.S. universities are not stepping up their game when it comes to teaching cybersecurity as a discipline. 401 more words
Tags » CyberSecurity
40 more words
Connected cars can talk to each other (vehicle-to-vehicle, or V2V), and they’re starting to be able to talk to the city they’re driving around (vehicle-to-infrastructure, or V2I).
In Chris Nerney’s post from about a year ago, “BYOD workers don’t care about security, but IT still has to,” a survey of over 11,500 workers in about 24 countries found that 31% of them had lost enterprise data through the use or misuse of a mobile device. 330 more words
On 21 April 2016, Prime Minister Malcolm Turnbull officially launched the Federal government’s national cybersecurity strategy. This initiative provides the pivotal step needed for the greater protection of the nation from cybersecurity attacks that have demonstrated the potential to endanger national security. 776 more words
As Albert Verhoeven wrote in his post last year, Two Reasons the IoT Will Be Disruptive Sooner than You Think, “the Internet of Things… 409 more words
The NewPoSThings point-of-sale malware may be a few years old, but it’s not too old to learn new attack tricks. Just like other memory scrapers, NewPoSThings would scrape memory for credit card data and then exfiltrate that information back to the attackers. 365 more words