Security News
![Apple Sues Corellium Over Security Research Tool](/static/build/img/news/alt/Data-Cybersecurity-Predictions-small.jpg)
Apple has filed a copyright infringement lawsuit against Florida-based virtualization company Corellium for creating “perfect replicas” of iOS that can be used for security research and other...
![Live Webinar: Insider Threat Program Realities - New Research Findings](/static/build/img/news/alt/cyberattack-statistics-1-small.jpg)
![Insider Threat Program Realities: New Research from ESG and Dtex Systems](/static/build/img/news/alt/cyberattack-statistics-1-small.jpg)
![Research shows that devices banned by US government lack basic security practices](/static/build/img/news/alt/hackers-statistics-small.jpg)
As the August 13 deadline looms for the US ban on Chinese surveillance cameras, the news cycle is re-engaged with the issue. The panic about banned cameras still being in operation shines a...
![SAP Ariba adds Japanese company data through partnership with Tokyo Shoko Research](/static/build/img/news/alt/web-statistics-small.jpg)
SAP Ariba announced a new partnership with Tokyo Shoko Research (TSR) to integrate data on more than 8.4 million Japanese companies covering over 200 evaluation criteria into the SAP Ariba...
![Research on Human Honesty](/static/build/img/news/alt/ransomware-statistics-small.jpg)
New research from Science: "Civic honesty around the globe": Abstract: Civic honesty is essential to social capital and economic development, but is often in conflict with material self-interest....
![Can Patient Data Be Truly 'De-Identified' for Research?](/static/build/img/news/alt/data-breach-stats-small.jpg)
Lawsuit Against University of Chicago, Google, Raises Important Privacy IssuesA lawsuit against the University of Chicago Medical Center and Google seeking class action status points to the...
![TechRepublic Premium editorial calendar: IT policies, checklists, toolkits, and research for download](/static/build/img/news/alt/cyberthreat-stats-small.jpg)
TechRepublic Premium content helps you solve your toughest IT issues and jumpstart your career or next project.
![Accenture Acquires Research and Consulting Firm Deja vu Security](/static/build/img/news/alt/cybersecurity-attacker-small.jpg)
Professional services company Accenture this week announced the acquisition of Deja vu Security, a provider of security research and consulting to premier technology firms. read more
![Research shows Tesla Model 3 and Model S are vulnerable to GPS spoofing attacks](/static/build/img/news/alt/hackers-statistics-small.jpg)
Tesla Model S and Model 3 electric cars are vulnerable to cyberattacks aimed at their navigation systems, according to research from Regulus Cyber. Staged attack caused the car to veer off the...