While the Department of Homeland Security has looked to step up its use of drones to patrol the U.S.-Mexico border, lax security policies have left the collected data vulnerable to hackers and insider threats, a new audit finds.
CS Digest Section: Data Security
Lawmakers want to draw the road map for privacy legislation for decades to come, and Silicon Valley is giving them some directions.
ESET researchers have discovered a cyberattack that used a UEFI rootkit to establish a presence on the victims' computers. Dubbed LoJax, this rootkit was part of a campaign run by the infamous Sednit group against several high-profile targets in Central and Eastern Europe and is the first-ever publicly known attack of this kind.
The Internet Crime Complaint Center (IC3), in collaboration with the Department of Homeland Security and the FBI, have issued a security alert regarding attacks being conducted through the Windows Remote Desktop Protocol. While the most publicized attacks over RDP are related to ransomware, attackers also hack into exposed RDP services for corporate theft,
Facebook revealed more details about how hackers exploited three distinct bugs to get the ability to control up to 50 million users' accounts.
According to a report from Bloomberg, Google and Mastercard have signed a secret deal so that Google could track retail sales using Mastercard transaction data. This is yet another proof that Google's true customers are its advertising partners.
Security researcher finds over 3,000 TechNet pages flooded with tech support scams pushing shady phone numbers for cryptocurrency exchanges and social media platforms.
In a set of rulings today, the European Court of Human Rights found that the mass surveillance scheme used by the GCHQ-the United Kingdom's signals intelligence agency-violated the European Convention on Human Rights (ECHR), unlawfully intruding on the private and family life and freedom of expression of British and European citizens. And the case included
A company which manages online payments for US government agencies and states has become central to a security incident leading to the potential exposure of 14 million records.
The term "security operations" is often interpreted to be synonymous with a security operations center (SOC). In fact, a web search on security operations results mostly in links to SOC content. But that's a narrow view. How you view security operations will make a difference in how fast your organization can deliver software and mitigate breach damage. A