Establishing new laws and regulations to address privacy and cybersecurity concerns related to the Internet of Things would likely be ineffective, attorney Steven Teppler, who co-chairs an American Bar Association IoT committee, says in an audio interview.
In the aftermath of a media maelstrom surrounding an alleged hack, the IRCTC flatly denies any compromise, but it's anxious to verify data in police possession, which the authorities apparently have still not shared. Here's the full lowdown.
Russian email service Mail.Ru says its users' credentials contained in data leaked to Hold Security are 99.982 percent invalid, leading it to slam the security firm for stoking "media hype." But Hold Security's CISO contends the leak contains valid email addresses that could be used for phishing and spam.
Federal regulators are reminding healthcare organizations about the urgency of having plans in place to manage security issues, including data breaches, involving their business associates. The guidance is important, security experts say, because about one-fifth of major health data breaches have involved BAs.
The digital banking shift creates great convenience - for the fraudsters, as well as the customers. What can institutions do to reduce their vulnerability to breaches and fraud? Dave Allen of Bottomline Technologies offers advice.
A security firm claims to have obtained from a young Russian hacker a data set that includes 272 million unique credentials for Hotmail, Gmail and Yahoo email addresses, among others. But there's no reason to panic, security experts say.
The Pakistan National Assembly has approved the cybercrime bill under the Prevention of Electronic Crimes Act, 2015. It is a positive move, but given the challenges of execution, there is still far to go in ensuring a cybersecure ecosystem.
Following a massive data leak, Qatar National Bank has confirmed that its systems may have been hacked. A group with Turkish ties has claimed credit for the attack and reportedly threatened to release information from a second bank hack.
Clinics, laboratories, durable medical equipment suppliers and other smaller healthcare entities need to bolster their breach preparedness as cyberattacks against smaller entities in all sectors continue to multiply, says David Finn of Symantec, who discusses findings from a new report.
The section chief of the FBI's Cyber Division says "the FBI does not condone payment of ransom," in part because it enables criminals to victimize others. Instead, the bureau continues to urge all potential victims to get their IT house in order.
Have you tested things before they break? Could an email be a trap? In honor of Star Wars Day, we proudly present essential cybersecurity lessons as derived from - and delivered via - the wisdom and wit of the iconic space opera.
A bipartisan bill proposing to elevate the position of CISO within the Department of Health and Human Services seeks to emulate moves that some larger private sector organizations - mostly outside of healthcare - have made in recent years.
Healthcare entities are increasingly in the crosshairs of attackers who seek to cause business disruption. How can threat intelligence bolster cybersecurity defenses? FireEye's Dan McWhorter offers insight and strategies.
Following the theft of $81 million from Bangladesh Bank, is it time for banks to make SWIFT money transfers less automated and better supervised and thus secure? An alleged scam from the days of telex machines and code books offers useful perspective.