Apple to terminate developers who collect, sell user data without consent

Apple has updated the Legal section of its App Store rulebook to include new guidelines for members of the iOS Developer Program. iOS developers who collect or sell personal data to a third party without clear, express consent from their users will be … Continue reading Apple to terminate developers who collect, sell user data without consent

Vermont librarian scores symbolic $600 win against Equifax in small claims lawsuit

In the wake of the Equifax incident last year, more than 143 million people had their personal and financial information leaked by hackers. For one 49-year-old librarian in Vermont, simply watching the company’s image get tarnished would not suff… Continue reading Vermont librarian scores symbolic $600 win against Equifax in small claims lawsuit

CISOs Have an Opportunity to Shine as Regulations Enforce Change, Gartner Says

Once a paltry segment of enterprise IT, security has become a crucial factor in the success of an organization. This paradigm shift, driven by growing legions of bad actors and new regulations, have cast the spotlight on IT security leaders like n… Continue reading CISOs Have an Opportunity to Shine as Regulations Enforce Change, Gartner Says

Patch your Flash Player now! Zero-day actively exploited in the wild

Adobe has released patches for all users running Flash Player 29.0.0.171 and earlier versions, addressing critical flaws in its trouble-plagued platform. Whether you are running the software on Windows, macOS, Linux or Chrome OS, the Flash Player creat… Continue reading Patch your Flash Player now! Zero-day actively exploited in the wild

Bug bounty payouts double in 2018; India reports the most bugs while U.S. wins highest payouts

Some of the biggest players in various industries have turned to the crowdsourced security model – white hat-driven bug bounty programs – in a race to identify emerging vulnerabilities before the black hats do. The crowdsourced security mod… Continue reading Bug bounty payouts double in 2018; India reports the most bugs while U.S. wins highest payouts

Is It Cheaper to Pay for Cybersecurity Now, or to Pay Ransom to Criminals Later?

Breaching enterprise systems and holding their data hostage is a growing threat to organizations everywhere. Governments are fighting back by putting the onus on custodians to protect their data or face hefty fines. Even so, bad actors show no sig… Continue reading Is It Cheaper to Pay for Cybersecurity Now, or to Pay Ransom to Criminals Later?

What You Need to Know About SamSam Ransomware. Hackers Paint Target on Healthcare

Ransomware remains the top threat faced by businesses as we move into the second half of 2018. Since the emergence of the first strains of ransomware in 2013, this nefarious trend has unfortunately only kept growing. And the latest such incidents … Continue reading What You Need to Know About SamSam Ransomware. Hackers Paint Target on Healthcare

Most Companies Still Unprotected Against 10-Year-Old Wireless Vulnerabilities

The Internet of Things may be mostly a consumer-facing phenomenon, but businesses too have become swayed by the IoT sensation. And, like regular users, they are starting to feel the heat caused by unsecured IoT devices.
The post Most Companies Sti… Continue reading Most Companies Still Unprotected Against 10-Year-Old Wireless Vulnerabilities