A biometric security system based on how a user moves their eyes is being developed by technologists in Finland. A biometric security system based on how a user moves their eyes is being developed by technologists in Finland. Writing in the International Journal of Biometrics, the team explains how a person’s saccades, their tiny, but […]
News
10 Tips For Protecting Mobile Users
Mobile employees, devices, and data need protecting. Here are 10 tips to make it happen. These days, every user is mobile. Laptops, smartphones, tablets, and constant connectivity have unshackled all of us from our desks. And thanks to the ready availability of apps and cloud services that blur the line between consumer and business tools, […]
Higher retail wages correlate with lower levels of employee theft
A study co-written by a University of Illinois business professor shows that higher wages are associated with lower levels of employee theft, shedding light on the impact that compensation practices have on shaping employee honesty and ethical norms in organizations. Using data sets from the convenience-store industry, Clara Xiaoling Chen, a professor of accountancy, and […]
Read More… from Higher retail wages correlate with lower levels of employee theft
10 Ways Enterprises Can Battle Malware
As malicious code rapidly evolves, the National Institute of Standards and Technology is updating its guidance to reflect changes in the threat malware presents organizations. The “Unlike most malware threats several years ago, which tended to be fast-spreading and easy to notice, many of today’s malware threats are more stealthy, specifically designed to quietly, slowly spread to […]
Tech Insight: Speeding Up Incident Response With Continuous Monitoring
Increase speed and effectiveness of incident response through continuous monitoring and enterprise IR tool integration Continuous monitoring is a buzz phrase come back to life thanks to the U.S. Office of Management and Budget and the Homeland Security Department telling government agencies to implement information security continuous monitoring (ISCM). NIST has also released three new […]
Read More… from Tech Insight: Speeding Up Incident Response With Continuous Monitoring
Homeland security cites sharp rise in cyber attacks
The companies that control critical infrastructure in the United States are reporting higher numbers of attacks on their systems over the past three years, according to a report issued by the Department of Homeland Security. The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) says the number of reported attacks is up and attackers have […]
Read More… from Homeland security cites sharp rise in cyber attacks
Spy agency fights to protect ID’s of sources
Canada’s spy agency says its network of informants has been “imperiled” by a Federal Court of Appeal decision that struck down its right to always shield the names of its sources. Canada’s spy agency says its network of informants has been “imperilled” by a Federal Court of Appeal decision that struck down its right to […]
Read More… from Spy agency fights to protect ID’s of sources
Security lapses found at CDC bioterror lab in Atlanta
A federal bioterror laboratory already under investigation by Congress for safety issues has had repeated incidents of security doors left unlocked to an area where experiments occur with dangerous germs, according to internal agency e-mails obtained by USA TODAY. In one incident, an unauthorized employee was discovered inside a restricted area. A Centers for Disease […]
Read More… from Security lapses found at CDC bioterror lab in Atlanta
Risks of boomerangs a reality in world of cyberwar
WASHINGTON (AP) — The Obama administration is warning American businesses about an unusually potent computer virus that infected Iran’s oil industry even as suspicions persist that the United States is responsible for secretly creating and unleashing cyberweapons against foreign countries. The government’s dual roles of alerting U.S. companies about these threats and producing powerful software […]
Read More… from Risks of boomerangs a reality in world of cyberwar
Flame Taps Bluetooth: Security Implications
Flame malware could use Bluetooth to exfiltrate data, record phone conversations, or learn the social network of a target. The Flame malware, detailed publicly for the first time Monday, has been described by security researchers working overtime to unravel its inner workings as “the largest and most complex piece of malicious code they’ve ever seen.” […]