Flaws in Qualcomm chipset software used by an estimated 900 million Android smartphones and tablets could be exploited to seize control of devices and steal any data they store, warns cybersecurity firm Check Point.
Delta is warning that a power failure lead to system outages, resulting in numerous flight cancellations or delays. As more airline-related processes get computerized, experts are asking why the airline's systems aren't more resilient.
The recent cyberattack on Banner Health Care, which may have compromised information on as many as 3.7 million individuals, appears to be the largest healthcare data breach reported so far in 2016 - a year that's already seen a string of disturbing hacker attacks. Here's an overview of recent cyberattack trends.
In the largest HIPAA settlement to date, federal regulators have smacked Chicago-based Advocate Health Care with a $5.5 million fine in the wake of an investigation into three 2013 breaches. The settlement is HHS's tenth HIPAA enforcement action this year.
Imagine the security implications of a world in which millions of people have a physical impairment that leaves them internet-connected. Say hello to the promise - and peril - of internet-connected hearing aids, says Global Cyber Alliance's Phil Reitinger.
Russia, which some have blamed for attacks against the Democratic Party in the U.S., has offered a detailed description of coordinated cyberattacks against its scientific, public authority and military institutions. Is the announcement a tit-for-tat move after the charges of Russian involvement in U.S. hacks?
This edition of the ISMG Security Report features Global Cyber Alliance CEO Phil Reitinger previewing his keynote address at ISMG's New York Fraud and Breach Prevention Summit. He explains why he believes today's approach to cyber risk management is stuck in the "Bronze Age."
The Democratic Party platform calls for balancing privacy and security concerns, and vice presidential nominee Tim Kaine endorses the formation of a commission to advise Congress on developing digital security and encryption laws.
Ransomware gangs are employing "customer service" agents to field victims' queries in an attempt to maximize their illicit profits, according to security firm F-Secure, which describes the encounters of someone posing as a victim.
Scuffles between anti-virus software vendors have stepped up a notch, with startups and industry stalwarts slinging mud at each other. Cylance now says it plans to make its product available for tests used to benchmark security software.