Apple, Amazon news highlights growing mobile cyber security market

Locked Phone

Amazon and Apple have made headlines in recent weeks as both companies have attempted to alleviate concerns regarding their mobile cyber security practices. While the technology titans have been the biggest brands to publicly undergo such analysis, it appears many other companies are following suit, according to multiple recently released reports. The global anti-malware industry […]

Cyber security professionals express concern about preparedness

ISACA-RSA Survey

Seventy-five percent of cyber security professionals expect to be victims of a cyber attack in 2016, according to a recent study released by ISACA and the RSA Conference that highlighted a startling level of concern regarding organizational cyber security, given that respondents were the very people entrusted to protect and enforce their systems. There were […]

Cyber security market to benefit from increased connected car usage

Connected Car

As automobiles become increasingly “smart,” connected to the Internet, and synced with Bluetooth, GPS and automated locking, the need to protect drivers from cyber attacks to their vehicles is expected to increase as well, according to a recent report published by Research and Markets. The connected car market is expected to hit $42 billion by 2018 with revenues […]

Specialist from NIST shares small business cyber security fundamentals

NIST_logo

A computer security specialist from the National Institute of Standards and Technology (NIST) recently addressed a gathering of small and mid-sized business people at the 2015 Cyber Security Summit in Minneapolis. The speaker, Patricia Toth, told her audience that small businesses are vulnerable and are increasingly the target of malicious attacks from cyber hackers. In 2013, 31 percent of cyberattacks targeted […]

Report finds data breaches at five HHS divisions in last three years

US Capitol

Add the Health and Human Services department to the growing list of cyber-attack victims. At least five Health and Human Services (HHS) divisions were attacked in a three year span between 2011 and 2013, according to a report released last week by members of the United States House Energy and Commerce Committee. The news continues the […]

Study finds more than half of hacked Android phones infected by privacy-stealing malware

android-malware-and-vulnerability-report-360-security

About one out of every one hundred mobile devices (1.4 percent) in the world was infected by malware in the second quarter of 2015, according to a report released by 360 Mobile Security Limited, a mobile antivirus developer. Sixty-two percent of these phones had “privacy-stealing malware” designed to grab sensitive information such as login credentials, […]

Senators introduce automotive cyber security legislation

CSB_graphic_1

United States Senators Richard Blumenthal and Edward Markey introduced legislation earlier this week designed to combat the rising threat of automotive cyber attacks, according to a release on Blumenthal’s Senate website. The bill, known as The Security and Privacy in Your Car (SPY Car) Act, would direct the National Highway Traffic Safety Administration and the […]

What does the Anthem breach mean for you?

Anthem Logo Small

In early February 2015, Anthem, Inc. reported that on January 29, 2015, it had discovered that it was the target of “a very sophisticated external cyber attack.” Anthem believes the attack happened over the course of several weeks, starting on December 10, 2014. Accessed information may have included the names, dates of birth, social security […]

Cyber Security Summit Chair discusses securing your infrastructure

AndrewBorenePasscode

Andrew Borene, chair of the 2015 Cyber Security Summit, spoke about securing your company’s infrastructure yesterday at an event hosted by The Center for National Policy and The Christian Science Monitor. You can view his full comments below. Borene is federal chief strategist at IBM for i2 Intelligence Analysis. You can read more on his presentation from the Christian Science Monitor: Transforming overwhelming […]