Microsoft does not have to turn over emails stored outside the U.S. to federal authorities investigating a crime, an appeals court has affirmed. The closely watched case, which explored the territorial boundaries of U.S. law in the cloud computing age, could end up at the Supreme Court.
As President Trump delivered his inaugural address, the White House transitioned its website from the Obama to the Trump administration. Immediately, Trump's team posted a series of position papers, including one that addressed - albeit briefly - cybersecurity.
The many companies in the Middle East that do business in Europe - and handle Europeans' data - now must comply with the European Union's new General Data Protection Regulation. And some security experts say that could lead to a boost in data security practices in the region.
Information security researchers have charted a steep decline in Locky ransomware and Dridex banking Trojan distribution in recent weeks. While that's good news, it may only reflect that a cybercrime gang is on vacation.
A researcher claims WhatsApp has dismissed his finding that there's a backdoor in the application that could allow attackers to unlock encrypted messages. But the controversy is more nuanced - and for most of us, much less threatening - than it might first appear.
Yet another study reveals that millions of people are picking weak passwords, with "123456" remaining our collective favorite. Rules requiring stronger passwords and not forcing passwords to expire both could help boost security.
A list of "super user" passwords - and a default username - now circulating online appears to allow unauthorized access to some webcam video streams, security researchers warn. If confirmed, it would be yet another massive internet of things security failure by a device manufacturer.
The website of Hindustan Petroleum Corp. Ltd. has been hijacked by hackers, according to Arctos Threat Research Co. Arctos claims it discovered that HPCL's website was infected with Cerber ransomware. But HPCL is awaiting the results of CERT-In's investigation into whether the website, indeed, is infected.
A U.K. Information Commissioner's report on its investigation into a 2015 TalkTalk breach offers essential information security takeaways for any organization that wants to avoid being breached, says David Stubley of 7 Elements.
The hacking group known as Legion is taking credit for hijacking the twitter accounts of high-profile Indians as well as accessing more than 40,000 servers. Is the nation well-equipped to mitigate the risks posed by hackers?
Leading the latest edition of the ISMG Security Report: an analysis of the impact on healthcare information security and privacy of the 21st Century Cares Act, which President Obama signed into law Dec. 13. Also, a report on the spread of malvertising and an update on the Bangladesh Bank cyber heist.
Facebook, Microsoft, Twitter and YouTube have promised to contribute to a shared database containing hashes - digital fingerprints - of images and videos that promote hatred or terror to facilitate more rapid takedowns. But does the project go far enough?
Representatives of government and various business sectors discussed actionable steps to create a cyber-secure environment at Information Security Media Group's recent GovInfoSec Summit Asia 2016 in New Delhi.
ISMG's upcoming Breach Prevention Summit in New Delhi shares steps for creating a cybersecure environment, as experts will discuss new approaches to tackle breaches and issues related to national critical infrastructure.