Were the regulation already in effect, the company could have faced more than $120 million in fines.
There are a lot of different pitfalls when it comes to IoT security that developers need to avoid.
Enterprise mobility management (EMM) is a sophisticated technology for controlling mobile access to data and networks. We review five of the top EMM solutions.
The online training provider raises millions to help IT professionals and job seekers gain some much-needed cybersecurity expertise.
The exploit, which requires no user interaction, can give the attacker control of the affected device.
The Apache Struts security flaw had been disclosed in March of 2017.
In many cases, companies that paid the ransom were scammed -- the data had simply been wiped.
The simple lesson in this case is to not pre-install software that violates user privacy.
The exposed information also includes names, birthdates and addresses, as well as some driver's license numbers, credit card numbers and other data.
The Dragonfly group now appears to be focused on compromising operational networks.
A pair of misconfigured Amazon S3 buckets belonging to third party vendors exposed two companies' highly sensitive data.
Widely used Java framework is once again updating for some highly impactful issues.
And if tech companies don't provide access, Rosenstein said, "legislation may be necessary."
The campaign is just one of many currently distributing Locky ransomware.
Patients using the pacemakers will need to be provided with a firmware update by a medical professional.
Widely used ecommerce module had a flaw that could have been used as a stepping stone to a larger attack.