EU privacy regulators give EU, U.S. three months to find new data pact

The EU Commission and the United States have been in talks for two years to reform Safe Harbour

Reuters

LONDON (Reuters) - Companies could face action from European privacy regulators if the European Commission and United States do not come up with a new system enabling them to shuffle data across the Atlantic in three months, the regulators said on Friday.

The highest EU court last week struck down a system known as Safe Harbour used by over 4,000 firms to transfer personal data to the United States, leaving companies without alternatives scrambling to put new legal measures in place to ensure everyday business could continue.

Cyber insurance premiums rocket after high-profile attacks

Cost trends upward for covering forensic investigations, credit monitoring, legal fees and settlements

Reuters

BOSTON (Reuters) - A rash of hacking attacks on U.S. companies over the past two years has prompted insurers to massively increase cyber premiums for some companies, leaving firms that are perceived to be a high risk scrambling for cover.

On top of rate hikes, insurers are raising deductibles and in some cases limiting the amount of coverage to $100 million, leaving many potentially exposed to big losses from hacks that can cost more than twice that.

Cisco security researchers disable big distributor of 'ransomware'

Disrupts the spread of one of the most pernicious systems for infecting Internet users

Reuters

SAN FRANCISCO (Reuters) - Cisco Systems Inc said it had managed to disrupt the spread of one of the most pernicious systems for infecting Internet users with malicious software such as so-called ransomware, which demands payment for decrypting users' data.

The investigators from Cisco's Talos security unit were looking at the Angler Exploit Kit, which analysts at several companies say has been the most effective of several kits at capturing control of personal computers in the past year, infecting up to 40 percent of those it targeted.

Millions of T-Mobile customers exposed in Experian breach

Data included names, addresses, birth dates, SSNs, drivers license and passport numbers

Reuters

(Reuters) - Experian Plc, the world's biggest consumer credit monitoring firm, on Thursday disclosed a massive data breach that exposed sensitive personal data of some 15 million people who applied for service with T-Mobile US Inc.

Connecticut's attorney general said he will launch an investigation into the breach.

The IoT Showdown and the Opportunity for 4G LTE

Before billions of connections can be realized, there is the question of how the devices will connect

It has been estimated that there will be no less than 50 billion connected devices online by 2020. Before the promise of billions of connected devices sharing information can be realized, there is the question of how, exactly, most of these devices will be connected. Internet of Things (IoT) solution providers and those supplying them are keenly interested in the answer since it will help determine how those solutions and their components are architected. Will specialized networks be built, or will an existing technology, such as Wi-Fi, LAN, satellite or cellular, fill the void?

U.S. senators ask automakers for details on cyber security

Letter recipients included BMW, Fiat Chrysler, Ford, GM, Toyota and VW

Reuters

BOSTON (Reuters) - Two U.S. senators have asked the world's biggest automakers for information on steps they have taken to protect cars from being hacked, as attention on vehicle security has surged following the first car recall over a cyber bug.

Democratic Senators Edward Markey and Richard Blumenthal wrote to 18 automakers on Wednesday asking about efforts taken to secure vehicles including 2015 and 2106 models. They asked automakers how they test electronic components and communications systems to ensure attackers cannot gain access to onboard networks.

Cisco router break-ins bypass cyber defenses

Attacks have hit multiple industries and government agencies

Reuters

FRANKFURT (Reuters) - Security researchers say they have uncovered clandestine attacks across three continents on the routers that direct traffic around the Internet, potentially allowing suspected cyberspies to harvest vast amounts of data while going undetected.

In the attacks, a highly sophisticated form of malicious software, dubbed SYNful Knock, has been implanted in routers made by Cisco, the world's top supplier, U.S. security research firm FireEye said on Tuesday.

Key Areas of Focus for the Internet of Things (IoT)

Communications, Content, and Commerce via IoT will involve new technologies, services, and business models

Telecom Engine and its research partner, Mind Commerce, see a few key areas of focus for the Internet of Things (IoT) that will require special attention over the course of the next three years on the part of software, platform, and infrastructure providers. 

China tells U.S. to stop 'groundless' hacking accusations

Denies any involvement in hacking and says it is also a victim

Reuters

BEIJING (Reuters) - China reacted angrily on Friday following a call by America's top intelligence official for cyber security against China to be stepped up, and said the United States should stop "groundless accusations".

Director of National Intelligence James Clapper said the United States must beef up cyber security against Chinese hackers targeting a range of U.S. interests to raise the cost to China of engaging in such activities.

Clapper's testimony adds pressure on Beijing over its conduct in cyberspace weeks before President Xi Jinping visits the United States.

'Always-On' Data Monitoring from PodsystemM2M Helps Businesses Overcome Fraud

CASWA Asset Management Devices Combined with Multi-Network Connectivity Prevent Fraud and Increase Profitability

CTIA SuperMobility Week

CTIA Super Mobility, Las Vegas, 10th September 2015 - PodsystemM2M, the expert in multi-network data SIMs for the M2M and IoT industries and CASWA, an Australian company that specializes in developing new technological solutions for engineering asset management, have today announced an agreement to provide global systems for data logging, collation and analysis to combat fraud and asset misappropriations.

Syndicate content

Featured Reports

Connected Vehicle: V2V and V2X Market Outlook 2017-2022

Connected vehicle technology is rapidly evolving to encompass Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I), Vehicle-to-Device (V2D), and Vehicle-to-Pedestrian (V2P) signaling and communications. This research examines the V2V and V2X market including technologies, solutions, and major players. 
Buy now

 

IoT Device Management: Outlook and Forecasts 2017-2022

The report evaluates market opportunities and challenges for IoT Device Management solutions across various industry verticals.  The report includes forecasting for global and regional markets as well as potential across deployment types and sectors including automotive, manufacturing, smart cities, and more.
Buy now

 

DAS Market Analysis and Forecasts 2016-2021

Analysis of the DAS market, including carrier WiFi, small cells, and SON, and the leading companies in the DAS ecosystem and their solutions.  The report also includes evaluation of market drivers, challenges, and provides forecasts for 2016 to 2021.
Buy now

 

NextGen Network OSS/BSS Forecast 2016-2021

Comprehensive coverage of NGN OSS/BSS including opportunities within Big Data and IoT, analysis of the drivers and issues related to the technical and business aspects of OSS/BSS, deployments and operations issues, and quantitative analysis with forecasts for anticipated growth through 2021.
Buy now