Is having too many stakeholders who care about cyberspace's viability a hindrance to security? That's one way to interpret comments from White House Cybersecurity Coordinator Michael Daniel as he addresses the challenges of governing the Internet.
The "Bolware" malware gang has used Web injection and "man-in-the-browser" techniques to steal up to $3.75 billion. The attack campaign demonstrates how easily attackers anywhere in the world can commit browser-based fraud.
A hacker who pleaded guilty to infiltrating law enforcement computer networks across the U.S. has been charged once again, this time with breaching a helpdesk company that supports companies such as Twitter.
What is the consumer impact of big data breaches such as Target's and P.F. Chang's? Victims blame the breached entities, and they want government action, says Al Pascual of Javelin Strategy & Research.
The Houston Astros Major League Baseball club has confirmed that information related to prospective player trades was illegally obtained from the team's servers in May and leaked to a sports news site.
From Neiman Marcus to P.F. Chang's, 2014 has shaped up to be the 'Year of the Data Breach.' What lessons can be gleaned from the trenches of breach investigation? Experian's Michael Bruemmer shares tips.
The "Energetic Bear," a.k.a. "Dragonfly," hacking campaign targets U.S. and Western European energy firms. While the hackers appear to be backed by Russia, the purpose of their attacks remains unclear.