Security News > 2017

The Approach to Cloud Security Should be No Different From the Approach to Network or Endpoint Security read more

NIST has organized a competition for public-key algorithms secure against a quantum computer. It recently published all of its Round 1 submissions. (Details of the NIST efforts are here. A...

No ID Required for High-Value Purchases Through TelesalesFraudsters recently ordered a total of nine iPhones and Samsung S8s from Sprint and Verizon with my personal details. With the internet...

Privacy Expert Rebecca Herold Offers Trend Outlook for the New YearSo, what can we expect next year? Privacy expert Rebecca Herold offers her predictions for the 11 most significant healthcare...

Mozilla has patched one critical vulnerability in its Thunderbird email client along with two bugs rated high.

Interesting destructive attack: "Acoustic Denial of Service Attacks on HDDs": Abstract: Among storage components, hard disk drives (HDDs) have become the most commonly-used type of non-volatile...

Curt Kwak, CIO of Proliance Surgeons, a large Washington state surgery practice, discusses top security challenges and priorities for the new year in this in-depth interview.

Exploring Samuel Visner's vision - patterned after the Manhattan Project and moonshot - for collaborating to create innovative ways to improve cybersecurity leads the latest edition of the ISMG...


Although the original creators of the infamous IoT malware Mirai have already been arrested and sent to jail, the variants of the notorious botnet are still in the game due to the availability of...