Profiles Of The Top 7 Bug Hunters From Around the Globe 'Super hunters' share a common goal: to find the most high impact valid bugs before a bad guy does.
ICS Mess: US Industrial Systems The Most Exposed New data shows vulnerable ICS equipment even as vendors are improving security.
EU's General Data Protection Regulation Is Law: Now What? Organizations have two years to prepare to act as borrowers, not owners, of customer data. Here are seven provisions of the new GPDR you ignore at your peril.
Healthcare Hacks Face Critical Condition It's not just SSNs and credit cards -- detailed patient records and full EHR databases are targeted by cybercriminals today.
Covert Voice Commands Can Hack A Smartphone Researchers from Georgetown University and the University of California, Berkeley say cybercriminals could use hidden voice commands via popular YouTube videos to infect Androids and iPhones with malware.
Omni Hotels Discloses Payment Card Breach Certain properties infected by point-of-sale malware that stole guests' card details.
SWIFT Boosts Defense Against Cyberattacks Cyber security firms hired, intelligence team set up to ward off future attacks on banks through SWIFT.