Malware researcher Ivan Kwiatkowski unleashed ransomware on tech-support scammers after his parents stumbled across a site warning they'd been infected by Zeus. Despite the feel-good factor, however, security experts advise against hacking back.
If intelligence or law enforcement agencies know that an organization's information systems are being attacked, when should they alert the victim, if at all? What if the victim is a political party? Here's a look at the issues raised by the Democratic National Committee hack investigation.
An unparalleled mystery has piqued the security community's curiosity. A group calling itself the "Shadow Brokers" claims to have stolen code and exploits from the Equation Group, a nation-state spying group suspected to be affiliated with the NSA.
The head of the nearly year-old ISAO Standards Organization, Greg White, describes how fledgling Information Sharing and Analysis Organizations can help create an information sharing ecosystem aimed at making IT more secure at enterprises of all sizes.
The creation of sophisticated inventory systems is critical to ensuring the security of an organization's diverse medical devices, says Dale Nordenberg, M.D., who heads a medical device security consortium. Learn about the group's latest efforts in this arena.
FireEye CEO Kevin Mandia has blamed his company's lower-than-expected quarterly revenue on the rise of ransomware and cyber extortion attacks and a decline in APT campaigns. Experts debunk those assertions.
A new research project called Amnesia tackles the password management problem by not storing full data in any one place where it can be hacked. But does this proposed solution truly offer better password security?
It's easy to look at the payments landscape and see only the flaws. But payment card security has come a long way in the past 10 years, thanks in large part to the PCI Data Security Standard. How will card security be refined in the coming decade?
In today's environment, federal and state regulators come at breached companies from all angles, with requests for investigative information, breach response plans and fines. Attorney Deborah Gersh explains why so many agencies stake their claims in breach response.
Australia's census debacle has prompted questions over whether main contractor IBM made errors, and if the Australian Bureau of Statistics underestimated the resources it needed to successfully power a busy, online service.
Granular patient consent policies - adopted despite HIPAA allowing certain data to be shared without explicit patient consent - can lead to less data being exchanged by healthcare entities, says researcher Julia Adler Milstein of the University of Michigan, who describes results of a new study.
Obviously, ransomware attackers have no scruples. But the latest attacks go to even further extremes, channeling everything from Hitler to cats, as attackers hone their attempts to shake down Windows and Android users alike.
To facilitate faster decision-making, better cost control and increased transparency, many organizations now task a single executive to oversee all security, privacy and risk functions, says ADP's Roland Cloutier.