- Former Hacking Team developer reportedly in contact with a terrorist group
- Black Hat 2015: Cracking just about anything
- Ad group urges FTC to reject right to be forgotten in US
- Banks balance security and workflow when encrypting in the cloud
- Neiman Marcus case a reminder to check your cyber coverage
intrusion - News, Features, and Slideshows
A hacker extracted customer log-in credentials from a server owned by Bitdefender that hosted the cloud-based management dashboards for its small and medium-size business clients.
The cyberespionage group that stole the personal records of millions of Americans from U.S. health insurer Anthem and the U.S. Office of Personnel Management (OPM) has also reportedly breached United Airlines.
The vast majority of Android phones can be hacked by sending them a specially crafted multimedia message (MMS), a security researcher has found.
Security researchers published limited details about four unpatched vulnerabilities in Internet Explorer because Microsoft has not moved quickly enough to fix them.
Italian surveillance software maker Hacking Team recently claimed that it hasn't lost any customers after the massive leak of its internal data two weeks ago. But it has lost at least one business partner: U.S.-based penetration testing specialist and zero-day exploit broker Netragard.
After the Office of Personnel Management breach, medical data was labeled as the "holy grail" for cybercriminals intent on espionage. "Medical information can be worth 10 times as much as a credit card number," reported Reuters. And now to steal such information, hospital networks are getting pwned by malware-infected medical devices.
Follow me, if you will, on a journey back in time to just one year ago. As 2013 turned into 2014, the information security industry was buzzing about the latest spate of breaches. Target had ushered in a new era of retail security breaches, with 40 million card numbers lost to the hackers. Little did we know at the time that this was just the beginning, and small potatoes in comparison to what was to come. One year ago, Neiman Marcus and Michaels had joined Target, and I wrote in response to the growing number of breach disclosures that "in fact, I have to wonder which retailers have not suffered breaches. The word on the street is that at least a half-dozen other retailers were compromised in the past few months, without publicity." Sadly, this turned out to be true. I hate being right all the time.
In today's threatscape, antivirus software provides little piece of mind. In fact, antimalware scanners on the whole are horrifically inaccurate, especially with exploits less than 24 hours old. After all, malicious hackers and malware can change their tactics at will. Swap a few bytes around, and a previously recognized malware program becomes unrecognizable.
Police in Austin, Texas, set up sting operations with cars they have under surveillance, watching for thieves to break into them. Marcus J. Carey's Web service, HoneyDocs -- born in the same city -- uses the same concept, only with computer files.
Security pros and government officials warn of a possible cyber 9/11 involving banks, utilities, other companies, or the Internet
- Westpac, NAB, RedBalloon debate ingredients of digital transformation
- News Corp partners with Quantium and MCN to launch new digital advertising products
- AppNexus president: Programmatic ad exchanges collaborations are the future
- Carnival Australia CEO: How we are leading with customer data
- How Australia Post’s IT and marketing chiefs lead digital change - together