The Latest News

  • Will MasterCard, Target Renegotiate?

    Banks Reject Breach Settlement, Push Forward with Lawsuit Will MasterCard, Target Renegotiate?

    MasterCard's breach settlement with Target has been derailed after not enough card issuers agreed to the terms. Now MasterCard is expected to attempt to renegotiate, while banks continue with a class-action lawsuit against the retailer. Read more...

  • Logjam Vulnerability: 5 Key Issues

    Don't Rush to Fix 20-Year-Old Flaw, Experts Say Logjam Vulnerability: 5 Key Issues

    While the "Logjam" vulnerability raises serious concerns, there's no need to rush related patches into place, according to several information security experts. Learn the key issues, and how organizations must respond Read more...

  • Massive 'Logjam' Flaw Discovered

    Report: NSA Likely Exploited Flaw to Crack VPNs Massive 'Logjam' Flaw Discovered

    Numerous websites, mail servers and other services - including virtual private networks as well as "all modern browsers" - have a 20-year-old flaw that could be exploited by an attacker, computer scientists warn. Read more...

  • Feds Charge Chinese with Insider Theft

    DoJ: Secrets from U.S. Firms Used to Start Up a Chinese Venture Feds Charge Chinese with Insider Theft
    A lab at Skyworks Solutions, where trade secrets were allegedly pilfered.

    Federal authorities have arrested a Chinese professor, accusing him of pilfering trade secrets from the computer systems of American high-tech companies where he and a co-conspirator once worked. Read more...

  • Router Hacks: Who's Responsible?

    40,000 Exploited Devices Show 'Internet of Things' Risks Router Hacks: Who's Responsible?

    An army of 40,000 small office/home office routers have been exploited by automated malware. But who's responsible for devices being vulnerable: vendors for using well-known defaults; or distributors and IT managers for not locking them down? Read more...

  • Article

    Dating Website Breach Spills Secrets

    Darknet Dump Offers 3.9 Million Users' Personal Details By Mathew J. Schwartz
    Dating Website Breach Spills Secrets

    One of the world's largest dating websites - self-described "thriving sex community" AdultFriendFinder.com - is investigating reports of a data leak containing details of 3.9 million users' personal details and sexual preferences.

  • Interview

    Manhattan Project for Cybersecurity R&D

    Employing ISAO to Get Researchers to Collaborate By Eric Chabrow
    Manhattan Project for Cybersecurity R&D

    Citing as inspiration the Manhattan Project, in which the United States developed the atomic bomb during World War II, Sam Visner is leading an effort to get cybersecurity researchers to collaborate in developing new ways to defend cyberspace.

  • Article

    Limiting 'Intrusion Software' Exports

    Plan Aims to Foil Adversaries from Buying Zero-Day Exploits By Eric Chabrow
    Limiting 'Intrusion Software' Exports

    A U.S. Department of Commerce proposal to restrict the export of so-called "intrusion software" to prevent foreign adversaries from acquiring zero-day exploits has raised concern in the developer community.

  • Article

    Hack Attacks: Not Just Insurers at Risk

    Analysts Ponder Who Could Be Targeted Next By Marianne Kolbasuk McGee
    Hack Attacks: Not Just Insurers at Risk

    Although the CareFirst BlueCross BlueShield breach is the third major hacker attack against a health insurer revealed in recent months, experts warn that other organizations, including health information exchanges, could be targeted next.

  • Article

    CareFirst BlueCross BlueShield Hacked

    Insurer Says Intrusion Resulted in Breach Impacting 1.1 Million By Marianne Kolbasuk McGee
    CareFirst BlueCross BlueShield Hacked

    CareFirst BlueCross BlueShield is the latest health insurer to be targeted by a sophisticated hacking attack. It recently discovered that an intrusion into a database in June 2014 resulted in a breach affecting 1.1 million individuals.

More news...

Webinars

More webinars...

White Papers

  • The Evolution of Provisioning

    Traditional provisioning has failed to deliver on its promised benefits. Over the years, organizations have struggled to keep up with increasing demands around cloud, mobile, and compliance. ...

  • Provisioning 2.0: The Future of Provisioning

    Traditional provisioning systems are failing to support business needs. Mobile and cloud computing are creating additional problems for organizations that were struggling with outdated identity and...

More whitepapers...
ARTICLE Protecting Obama's Emails from Hackers

A report that Russian hackers read President Obama's email correspondence raises further questions...

Latest Tweets and Mentions

ARTICLE Protecting Obama's Emails from Hackers

A report that Russian hackers read President Obama's email correspondence raises further questions...

The ISMG Network