Imagine a computer network that can fool intruders into seeing configurations that in reality don't exist, making it hard for them to invade the system. That's what Scott DeLoach is trying to figure out how to do.
The Federal Bureau of Investigation warns of a scheme involving pop-up windows through which fraudsters trick travelers into installing bogus software updates. The "updates" are really malware installations.
The hacktivist group Anonymous says it has stolen 1.76 GB of data from a United States Bureau of Justice Statistics server and posted it online for download. What's the rationale behind this latest attack?
The Department of Homeland Security has issued a report on the risks involved in using wireless medical devices and other mobile technologies in healthcare and the best practices for mitigating threats.
"You need to educate people, and you need to have the right control procedures in place to ensure that people are aware of insider fraud," says Larry Ponemon, offering tips to reduce insider risks.
In an interview about the insider threat, Ponemon discusses:
Key findings from this new research;
What needs to be...
A U.S. District Court has sentenced the last key figure from 2009's Operation Phish Phry, a two-year international cybercrime investigation that resulted in the arrest of 100 fraudsters on two continents.
New alerts from Visa and MasterCard suggest the breach at Global Payments dates to January 2011, an exposure window significantly longer than originally reported. What are the implications for card issuers?
Utah Gov. Gary Herbert has taken several steps in the wake of a hacker attack against an unencrypted server that exposed state health department information on 780,000 individuals. Experts assess whether the steps are the right moves.