New Portal Launched For ICS/SCADA Threat Intelligence-Sharing Among Nations The East-West Institute teamed up with the US ICS-ISAC to create a platform for critical infrastructure operators worldwide to share threat data.
Apple's Workflow For Enterprise iOS App Distribution Vulnerable To Attack Millions of iPhones and iPads running iOS 9 can be exploited if enrolled in mobile device management, Check Point Software says.
Symantec: Financial Trojans Declined By 73% In 2015 Symantec detected far fewer financial Trojans in 2015 and saw cybercriminals focus more of their efforts directly on financial institutions.
Machine Learning In Security: Seeing the Nth Dimension in Signatures How adding "supervised" machine learning to the development of n-dimensional signature engines is moving the detection odds back to the defender.
Hackers Attack Major US Law Firms Hackers broke into computer networks of prominent law firms, and the FBI is investigating whether the stolen data was used for illegal trading purposes, the WSJ reports.
NIST Publishes New Security Standard For Encrypting Credit Card, Medical Info NIST published a new cybersecurity standard that specifies 'format- preserving encryption' techniques to secure credit card number and sensitive medical information.