As the number of major health data breaches continues to climb, federal regulators are taking steps to make the process of reporting breaches using online tools more efficient, hoping that will help ease the launching of investigations.
The Regin espionage and surveillance malware offers attackers advanced capabilities, but a new analysis of two recovered modules finds the components are basic and unveils potential clues to the identity of its creator.
The recent hack attacks targeting Sony Pictures and the U.S. Postal Service illustrate why all organizations - and not just healthcare entities - need to make safeguarding health-related information a top priority, says attorney Susan A. Miller.
Grocery chain Schnucks has won a court ruling against its payments processor and merchant bank, setting a $500,000 cap on how much it must pay for a 2012 POS breach. Learn how imprecise contract terms played an important role in the ruling.
A third member of an international hacking ring has pleaded guilty in connection with his role in conspiring to break into computer networks of technology companies, including Microsoft, to steal intellectual property.
President Obama urged Congress in his State of the Union address to pass legislation to better meet the evolving cyberthreat, but spent very little of the speech explaining its dangers or detailing his cybersecurity legislative agenda.
New competitive pressures in the healthcare industry are creating increased customer demand for online information and account portals, which is spawning a whole new crop of web and mobile assets. During this rapid build-out, it's easy for organizations to lose sight of all their assets. Meanwhile, criminals are...
Malvertising is arguably the fastest-growing and least well understood online threat vector today. Malicious advertising, or malvertising for short, is a technique used to distribute malware on popular websites via online advertising networks. RiskIQ has observed an exponential increase in the number and ferocity of...
ESG research indicates that many security professionals feel like the malware threat landscape is getting worse. Why? Aside from targeted attacks conducted by cybercriminals and nation-states, hackers are getting more creative using ad networks, partner websites and mobile applications to attack organizations or...
When IT professionals think about information security, they often think about network intrusion detection systems (IDS) and intrusion protection systems (IPS) early in the process. Network IDS/IPS has long been a mainstay for detecting malicious activity and continues to be a very important piece of the security...
Security is a necessary component in the corporate digital infrastructure. Unfortunately, rallying support behind security initiatives is often easier said than done. By improving mutual understanding of management and analyst perspectives, IT security professionals and non-technical managers can define a smoother...
The entire security industry has focused in on the newest buzzwords: Threat Intelligence. The term is so broadly used the definition of "intelligence" is sometimes lost. Some services are simply offering access to minimally analyzed (or even raw) data. Learn how to tell what "intelligence" really means and how to...
The explosion of breaches in 2014, especially highly-publicized payment breaches, created a substantial shift in consumer behaviors and attitudes. As a result, the breach landscape has fundamentally changed and businesses are scrambling to adapt. Now, more than ever, businesses are held accountable by consumers and...
In the aftermath of a payment card breach, as fraudsters race to exploit the stolen information, card issuers and affected customers take steps to mitigate risks. Here's a look at the lifecycle of a payment card breach from three perspectives.
A hack attack targeting a U.K. shoe retailer that exposed personal details and passwords for more than 1 million customers highlights the need to identify and dispose of older data that is no longer needed.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.