The management has an inherent temptation to filter audit reports before submitting those to the audit committee Read more »
Tarini, a hydro-power producer signed a PPA with the state distribution licencee at a particular rate Read more »
Investigators Identify Two POS Malware Attack WavesNationwide fast food chain Wendy's has revised from 300 to 1,025 the number of restaurants that suffered payment card compromises. Investigators say the breach was more... Read more »
A bitter battle flares up in the fiercely competitive endpoint protection products market, and uncovering the real impact over Hillary Clinton's email server. These items highlight this edition of the ISMG Security... Read more »
Researchers Say Malware Generates $300,000 Monthly For Chinese GangSecurity firms are warning that they've seen a spike in infections tied to a virulent strain of trojanized Android adware called Shedun - a.k.a.... Read more »
Russia's Arrests of Lurk Gang Likely Took Bite Out of CrimeCisco's Talos research unit says it has found evidence of ties between operators of the Angler exploit kit and a group of... Read more »
Deception technology could be a game-changer, with many thought leaders and organizations already getting behind the concept of "assume compromise." Smokescreen founder Sahir Hidayatullah speaks about the rise of this emerging technology. Read more »
The World's Biggest Metaphor for Online Security Stupidity Lives OnForget the 2015 mega-breach, an ongoing FTC probe or multiple class-action lawsuits: A new leadership team wants to reboot infidelity-focused online dating website... Read more »
Eleanor and Keydnap Infections Most Likely ScantSecurity vendors are issuing warnings about two new types of dangerous Mac malware - Eleanor and Keydnap - which serve as a reminder that it's not... Read more »
Budgets for online video programming are growing, at the expense of television advertising. Read more »