Amazon's AWS cloud platform now has a security feature that will block all public access to S3 data storage buckets.
In the coming weeks, Firefox will begin to warn users when they visit a site that has been part of a data breach.
Attacks on the global supply chain—sabotaging hardware components, installing malware or backdoors in software—are stuff security nightmares are made of. The ICT Task Force, formed by the Department of Homeland Security, meets to help companies manage their risk.
A bill that passed the House Tuesday will create the new Cybersecurity and Infrastructure Security Agency to handle the government's cybersecurity responsibilities.
The Magecart group has been compromising web stores and skimming card numbers from them for several years, and security researchers are exposing much of the group's techniques and tactics.
Three years ago, the United States shifted to chip-enabled credit and debit cards. The big promise was that chip cards would reduce payment card fraud. While that is mostly true, millions of chip-cards are still getting stolen because some merchants haven't made the switch.
A new transparency report on Android security shows that far less than one percent of all devices have a potentially harmful app running on them.
Despite high-profile data breaches, increased scrutiny of how consumer data is used, and several hearings, there hasn’t been a lot of movement on privacy legislation out of Congress. That may change if lawmakers decide to pass the U.S. version of the European Union's data privacy law.
A group within the U.S. Cyber Command is now contributing malware samples to VirusTotal, part of a broader strategy to put pressure on foreign adversaries.
Google's OSS-Fuzz open source fuzzing project has identified more than 9,000 bugs in less than two years and is now expanding.
IBM has been touting the potential of using Watson to help security analysts analyze large volumes of security data and make security decisions. The National Institutes of Standards and Technology may be considering using AI to help determine the severity of software vulnerabilities.
There is a serious flaw in the file upload component in the Struts 2.3.x framework that can lead to remote code execution on vulnerable apps.
Researchers at Radboud University have uncovered a number of serious weaknesses in self-encrypting solid-state drives.
Sen. Ron Wyden is circulating a draft of a bill that would punish corporate privacy violations with massive fines and potential jail time for executives.
The likelihood of a successful attack using a pair of vulnerabilities in some wireless access points with Bluetooth Low Energy chips against an enterprise network is currently low, but the fact that such an attack can bypass network segmentation is worrying.