Indiana’s Attorney General has launched an investigation into a data breach at Medical Informatics Engineering, which has affected up to 4 million people.
The post Indiana’s AG launches investigation into major data breach appeared first on We Live Security .
It’s not all about crashing cars and hacking guns: what’s hot at Black Hat 2015 USA (#BHUSA) and how to get the most from the event.
The post Black Hat 2015: What to watch out for, besides cars and guns appeared first on We Live Security .
From finding flaws to suggesting innovative security measures for the future, we look at some of the biggest bug bounty payouts in recent years.
The post The world’s biggest bug bounty payouts appeared first on We Live Security .
Recent aggressive hacks on companies underline the need for good risk analysis, situational awareness, and incident response. Just ask AshleyMadison, Hacking Team, and Sony Pictures.
The post Hacking Team and other breaches as security lessons learned appeared first on We Live Security .
Facebook has made a new feature called Security Checkup generally available after testing on an invite-only group, according to SoftPedia.
The post Facebook Security Checkup feature now available appeared first on We Live Security .
Want to mend your systems admin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences.
The post 5 Systems Admin relationship tips (so you’re on talking terms again) appeared first on We Live Security .
United Airlines customer flight records have been lost in a data breach it has been reported.
The post United Airlines customer flight records breached appeared first on We Live Security .
Operation Patao Express – Attackers spying on high-value targets in Ukraine, Russia and Belarus, and their TrueCrypt-encrypted data.
The post Operation Potao Express: Analysis of a cyber-espionage toolkit appeared first on We Live Security .
As the cost of fixing security mistakes in Jeep Chrysler Dodge vehicles mounts, so does the need for manufacturers to weigh cybersecurity risks in the product development process, alongside features and benefits.
The post Cybersecurity and manufacturers: what the costly Chrysler Jeep hack reveals appeared first on We Live Security .
The majority of managers believe that IT risk management data genuinely influences board decisions, according to Gartner.
The post Cybersecurity is increasingly a ‘board-level’ issue, finds report appeared first on We Live Security .
Posts navigation
Software and Security Information