US Lobbyists Write EU Online-Privacy Law

US Lobbyists Write EU Online-Privacy Law

The European Union is working with the American Chamber of Commerce, Amazon and eBay to write a new online privacy policy.

Secret Wars—Cyber or Otherwise—Destroy Democracies

Secret Wars—Cyber or Otherwise—Destroy Democracies

The Obama administration has given itself the right to wage pre-emptive cyberwars and order assassinations of U.S. citizens seemingly free from oversight of the other two branches of government, according to CIO.com blogger...

NYT, WSJ Forget the Facts in Stories About Their Own Hacks

NYT, WSJ Forget the Facts in Stories About Their Own Hacks

After getting hacked last week, both The Wall Street Journal and The New York Times irresponsibly published allegations about the hackers without the necessary facts to support them.

Hackers Hijacking Security Cameras for Malware and Spying

Hackers Hijacking Security Cameras for Malware and Spying

Tens of millions of devices -- including printers, routers and smart TVs -- are also at risk. Vulnerability of the devices' unprotected Linux servers compounds the problem with the Universal Plug and Play networking standard.

India Hopes Paper Brochures Help Patch Cybersecurity Holes

India Hopes Paper Brochures Help Patch Cybersecurity Holes

This week's IT security news roundup has stories on the Indian government's (ridiculous) plan to ship cybersecurity brochures with new computer hardware; Gozi malware arrests; new SCADA password cracking code; Android software...

At Davos the Elite Ponder Stale Cybersecurity Issues—and Charlize Theron

At Davos the Elite Ponder Stale Cybersecurity Issues—and Charlize Theron

The Rich and Powerful attendees of the World Economic Forum say they're concerned that the U.S. government and businesses aren't working together to protect them from hackers. But big American banks have been getting help from the NSA...

Cyber War is Upon Us–But Only One Side is Attacking

Cyber War is Upon Us–But Only One Side is Attacking

Is a cyberwar really a war if only one side is fighting? The United States hit Iran's nuclear program with Stuxnet and followed up with Flame, the James Bond of spyware. But Iran's response is the equivalent of a few shots from a Nerf...

US Congress Used BitTorrent to Steal Movies, TV

US Congress Used BitTorrent to Steal Movies, TV

This week's cybersecurity news roundup has stories on the U.S. Congress illegally downloading movies and TV shows; an employee who worked several jobs at once by outsourcing them all to China, for a fraction of his pay; new Java...

Why You Need to Protect Your Home from Cyber Pearl Harbor (Now!)

Why You Need to Protect Your Home from Cyber Pearl Harbor (Now!)

All those cool, Internet-ready appliances may have already turned your kitchen into a kill zone and your bathroom into a blood bath. Fortunately, it's not too late to save you and your family, thanks to the PurplexUs Corporation’s new...

Powerful 'Red October' Malware Attacks Gov't, Industry

Powerful 'Red October' Malware Attacks Gov't, Industry

Kaspersky Labs says new new "Red October" malware is as sophisticated as Flame, and it may have been created by criminals—not a nation or country.

Cats Are Newest Vector for Computer Virus

Cats Are Newest Vector for Computer Virus

Also in this week's IT security news: Blackhole creator returns with blinged-out exploit pack; researchers bypass Microsoft fix for IE Zero Day exploit in 24 hours; European credit card crooks cash in on $2 billion a year; John McAfee...

 Privacy Anecdotes Trump Data at CES

Privacy Anecdotes Trump Data at CES

CIO.com blogger Constantine von Hoffman says a group of young panelists who spoke about online privacy at CES isn't representative of generation Y as a whole. Here's why.

Online Crooks (Unnecessarily) Get Smarter

Online Crooks (Unnecessarily) Get Smarter

The FBI says updates to two known scams show bad guys demonstrating totally unnecessary levels of diligence and creativity. In order to see exactly how unnecessary you need only look at the agency's list of 2012's most commonly-used...

Colleges Give Students Tools to Hide What They Did in College

Colleges Give Students Tools to Hide What They Did in College

This week's IT security news roundup has stories on colleges offering free online-reputation management tools to students; a secret NSA computer test; hospital data-breach statistics; a Chrome-browser clickjacking vulnerability; and...

NYT Twists Imperva Antivirus Study into Utter Nonsense

NYT Twists Imperva Antivirus Study into Utter Nonsense

A recent New York Times report suggests antivirus programs are useless because they don't always detect new threats. But the report is misleading because it overlooks the fact that antivirus software can detect older threats that are...

Why You Shouldn't Be Afraid of 'Murder By Internet-Connected Devices'

Why You Shouldn't Be Afraid of 'Murder By Internet-Connected Devices'

Fear-mongering is an effective sales technique, but a recent prediction from security firm IID is gratuitous and bizarre. CIO.com blogger Constantine von Hoffman wants IID to put its money where its mouth is.

10 Great Cybersecurity News Sources

10 Great Cybersecurity News Sources

The 10 news/analyst websites/RSS feeds I follow and you should, too. They put the Info in InfoSec.

Instagram Proves We Care More About Pictures Than Personal Data

Instagram Proves We Care More About Pictures Than Personal Data

We seem to accept that Facebook and Pinterest hand off our personal data to advertisers, but virtual angry mob gathers at the mere idea that Instagram might use people's pictures in advertising.

The Only 2013 Cybersecurity Predictions List You Need to Read

The Only 2013 Cybersecurity Predictions List You Need to Read

CIO.com blogger Constantine von Hoffman compiled and condensed all the painfully-obvious and self-serving 2013 cybersecurity-threat-prediction lists on the Web into a single tasty nugget.

Even Dumb Hackers Can Make Crime Pay

Even Dumb Hackers Can Make Crime Pay

This week's IT security roundup has stories on some not-so-smart Facebook hackers; malware that infected hundreds of PoS systems in 40 different countries; "Project Blitzkrieg;" and more.

Load More