Apple CEO Tim Cook traveled to China in the wake of allegations that hackers are targeting Chinese iCloud users. The Chinese government has denied any involvement in the attacks, which can bypass the latest iPhone's stronger encryption.
Apps for wearable devices that are designed to track a user's pulse rate, blood-oxygen level or location may be leaking that data during transmission, Symantec security researcher Candid WÃ¼eest warns in a Black Hat Europe briefing.
Amsterdam is again playing host to the annual Black Hat Europe information security gathering, and presenters have promised to cover everything from privacy flaws in wearable computers to two-factor authentication system failures.
The development of authentication technologies that could replace the password is "nearing a tipping point," but there's still several years of work to do, says Jeremy Grant, who oversees the National Strategy for Trusted Identities in Cyberspace.
Apple announces security and privacy changes tied to the release of iOS8, including better data encryption, more secure iCloud backups, and a corporate promise to be more transparent. But it delays release of its HealthKit.
Federal government auditors have identified weaknesses in the technical controls protecting the security of the federally run Obamacare HealthCare.gov website and systems, which they say create increased and unnecessary risks.
Google has launched a seven-city EU tour to discuss the so-called "right to be forgotten." But legal and privacy experts are debating whether Google is seeking an honest and open discussion, or trying to undermine a polarizing European court ruling.
The EU is expected to approve in October an updated data protection law that spells out uniform breach notification requirements, security expert Jacky Wagner explains. The measure would apply to any business that targets Europeans.
Apple's advice to always use strong passwords and two-factor authentication ignores that image hackers are bypassing those controls - and celebrities aren't the only victims. Here's what needs to change.
Enterprises need to think beyond malware, breaches and insider threats when assessing information security. Keeping hardware up and running - available - is a crucial aspect of securing essential data.
A Twitter chat featuring Gartner's Avivah Litan offered a lively discussion of numerous fraud-related issues, including card breaches, weak authentication and the need for mobile scrutiny. We'll host more chats soon.