The Apple desktop and mobile product vulnerabilities that were revealed this week, in a WikiLeaks data dump of documents allegedly describing several secret CIA projects, were all fixed years ago, Apple said Friday. The leaked information on the Apple vulnerabilities is from a larger collection of documents that WikiLeaks has dubbed “Vault 7,” containing hitherto…

Apple’s initial analysis of the iPhone and Mac exploits disclosed by WikiLeaks on Thursday shows that the vulnerabilities they use have already been patched. The company told WikiLeaks to send the information it possesses through the regular submission process. WikiLeaks’ second “Vault 7” dump, dubbed by the organization “Dark Matter,” includes documents describing tools allegedly…

FBI director James Comey has suggested that an international agreement between governments could ease fears about IT products with government-mandated backdoors, but privacy advocates are doubtful. Speaking on Thursday, Comey suggested that the U.S. might work with other countries on a “framework” for creating legal access to encrypted tech devices.

Healthcare IT professionals and executives believe overwhelmingly that when facing hardware malfunctions and environmental disasters, their organization’s data is safer in the cloud than on premises, according to Evolve IP. The survey also revealed a preference for private over public clouds with about 60 percent preferring private cloud infrastructure over public clouds for data security.

The U.S. Senate has voted to kill broadband provider privacy regulations prohibiting them from selling customers’ web-browsing histories and other data without their permission. The Senate’s 50-48 vote Thursday on a resolution of disapproval would roll back Federal Communications Commission rules requiring broadband providers to receive opt-in customer permission to share sensitive personal information, including…

We’ve all become somewhat jaded when hearing about the billions of mobile devices being used by corporate employees and individual consumers (with individual devices increasingly used across both business and personal settings). Somewhat less well known – and still surprising – is the number of mobile apps active in the typical corporation. One recent assessment by Skyhigh Networks found that the average organization uses 1,427 cloud services, each represented…

Security testing tools can help organizations build better software by identifying vulnerabilities early in the SDLC. For security professionals and developers, however, the hard work begins when the testing is complete. Once you have a list of vulnerabilities across multiple applications, what’s your next step in vulnerability management and triage? And how do you ensure…

Companies across industries are increasingly leveraging the cloud for security applications, with 42 percent indicating they currently run security applications in the cloud and 45 percent stating they are likely or extremely likely to transition security operations to the cloud in the future, according to Schneider Electric. Organizations utilize the cloud for existing applications including…

Ransomware attacks are now incredibly sophisticated and occurring with increasing frequency.  In fact, many called 2016 “the year of ransomware,” and for good reason: Trend Micro found there were 752 percent more new ransomware families discovered compared to 2015. With the rise of ransomware, it’s very likely that your business will be affected by one of these attacks in…