Microsoft has settled a class-action lawsuit regarding sales at its Microsoft Store outlets. And if you made a purchase at one of those stores, you might be owed as much as $100. The lawsuit alleged that Microsoft Store receipts contained too much information. The lead plaintiff’s receipt listed the buyer’s name, the name of the
Google is pretty strict about its Project Zero rules when it comes to disclosure: a company has 90 days to fix the bug after it is informed by Google, after which it is announced to the public. Google did it last week with the announcement of two unpatched bugs, and now it’s doing it again.
There have been more egregious episodes of U.S. border agents hassling and/or needlessly detaining citizens and valid visa-holders since the White House changed hands, but perhaps none has been more bizarre – or even darkly comical – than this one. Celestine Omin, a 28-year-old software engineer from Lagos, Nigeria, was traveling to the U.S. on
BARCELONA — Homeowners worried about cybersecurity attacks on IP-connected devices like lights, baby monitors, home security systems and cameras, will soon be able to take advantage of a $200 network monitoring device called Dojo. The device was shown at Mobile World Congress here this week and will go on sale online in April. While the
Cisco is playing down a security issue with its Smart Install switch management software that could allow unauthenticated access to customer configuration details. Cisco defines Smart Install as a legacy feature that provides zero-touch deployment for new switches, typically access layer switches. +More on Network World: Cisco Jasper grows Internet of Things reach, breadth+ Cisco
The profitability of ransomware made it the top cyber threat last year in two categories: the number of attacks and the amount of money generated for crooks, according to a Trend Micro lookback on data collected from customers. Not only is the ransomware business booming, it’s innovating, with Trend Micro researchers identifying 752 new families
For the past few weeks attackers have been probing networks for switches that can potentially be hijacked using the Cisco Smart Install (SMI) protocol. Researchers from Cisco’s Talos team have now released a tool that allows network owners to discover devices that might be vulnerable to such attacks. The Cisco SMI protocol is used for
No one wants to learn that they have been hacked; if a company is not doing so well, then it might really be scared after it is breached. But burying your head in sand and hoping it will all go away if you ignore it for long enough is simply not going to make the
On March 1, new regulations go into effect in New York State, requiring that all regulated financial services institutions have a cybersecurity program in place, appoint a Chief Information Security Officer, and monitor the cybersecurity policies of their business partners. It might seem a little sudden, since the regulations were only finalized a month ago.
While plenty of controversy has surrounded President Donald Trump’s fledgling administration, it hasn’t yet faced a major crisis. But according to Forrester Research, aside from any political or military events, the new president will face a cyber crisis sometime within his first 100 days. The company made the prediction last fall, prior to the election,