The Latest News

  • Lenovo Website Hijacked

    Lizard Squad Takes Credit, Says It Has Stolen E-Mails Lenovo Website Hijacked

    The hacking group Lizard Squad has claimed credit for hijacking the website of Lenovo.com and redirecting visitors to an attacker-controlled site. It also indicates that it's now sitting on a cache of stolen Lenovo e-mail messages. Read more...

  • Anthem Breach: 78.8 Million Affected

    Investigation of How Much Data Was Actually Stolen Continues Anthem Breach: 78.8 Million Affected

    Anthem Inc. now confirms that the health insurer's recent data breach compromised a database containing personal information on 78.8 million individuals, with information on millions potentially stolen. Read more...

  • File Sharing: How to Minimize Risks

    Taking the Right Breach Prevention Steps File Sharing: How to Minimize Risks

    The risk that hackers could target cloud-based file-sharing services must not be overlooked, security experts warn. Learn about the areas of concern, and how they can be addressed. Read more...

  • Report: Spies Stole SIM Encryption Keys

    Snowden-Leaked Documents: SIM Card Maker Gemalto Hacked Report: Spies Stole SIM Encryption Keys

    A British/American intelligence team hacked Gemalto - the world's largest SIM manufacturer - and stole encryption keys that can be used to intercept and eavesdrop on cellular communication, according to a news report citing leaked documents. Read more...

  • Secure Domains: The DNS Security Debate

    Will CloudFlare's DNSSEC Move Improve Internet Security? Secure Domains: The DNS Security Debate

    Better DNS security could help block some types of spoofing, poisoning and DDoS attacks. But the DNSSEC approach has its critics, and it wouldn't improve Internet security overnight. Read more...

  • Article

    Lawsuit Filed in Insider Breach

    Alleges Patients Didn't Get Privacy Protection They 'Paid For' By Marianne Kolbasuk McGee
    Lawsuit Filed in Insider Breach

    A class action lawsuit has been filed against a hospital company and a business associate for an insider breach that affected more than 82,000 individuals. The suit alleges patients didn't get the privacy protections they "paid for."

  • Article

    Hackers Steal Trading Algorithms

    Attacks Aimed at Hedge Funds, Trading Firms By Mathew J. Schwartz
    Hackers Steal Trading Algorithms

    Hackers have been stealing the secret trading algorithms that are the lifeblood of many hedge funds and high-frequency trading firms, according to two security companies. What can be done to mitigate the risks?

  • Article

    Compromise on Info-Sharing Bill Grows

    GOP Committee Chairman Says He Sees Merit in Obama Plan By Eric Chabrow
    Compromise on Info-Sharing Bill Grows

    A willingness to compromise expressed at a House hearing on President Obama's cyberthreat information sharing initiative offered a sign of hope that legislation to get businesses to share such data could pass Congress and be signed into law.

  • Article

    Target Breach Costs: $162 Million

    Response Expenses Continue to Grow Following 2013 Incident By Jeffrey Roman
    Target Breach Costs: $162 Million

    Target's breach-related expenses not covered by insurance have totaled $162 million so far, its latest financial report shows. And experts say the breach could continue to have a financial impact for years to come.

  • Article

    Police Disrupt Banking Malware Botnet

    But Worldwide Impact of Ramnit Takedown May Prove Temporary By Mathew J. Schwartz
    Police Disrupt Banking Malware Botnet

    Authorities have disrupted a botnet that was serving up the Ramnit banking malware, which has infected 3 million PCs worldwide. But information security experts warn that the disruption will likely be temporary.

More news...

Webinars

  • Investigative Analytics: Velocity to Respond

    Minimizing cybersecurity incident response times are integral to mitigating modern business risk, however current information security strategies and programs suffer from a gap in investigative...

  • Business Continuity Planning Best Practices

    Vital to any critical industry is good business continuity planning where the impacts of delays can be more readily quantified. The need for effective business continuity planning is well-understood...

More webinars...

White Papers

  • M-Trends® 2015: A View From the Front Lines

    Talking about the threat landscape is no substitute for experiencing it first-hand. "M-Trends 2015: A View from the Front Lines," distills the insights gleaned from hundreds of Mandiant incident...

  • 2015 Security Predictions: Another Bumpy Year Ahead

    It was a tough year for CISOs in 2014, and a great year for cybercriminals, as billions of dollars of global economic productivity were siphoned into their hands. It's easy to see that thieves are...

More whitepapers...
ARTICLE Payment Security Initiatives Unveiled

The White House Summit on Cybersecurity and Consumer Protection late last week served as the stage...

Latest Tweets and Mentions

ARTICLE Payment Security Initiatives Unveiled

The White House Summit on Cybersecurity and Consumer Protection late last week served as the stage...

The ISMG Network