As organizations worldwide rush to mitigate the outbreak of the WannaCry crypto-locking ransomware, Adam Meyers of CrowdStrike shares insights on what researchers have gleaned from the attacks and how organizations should respond.
To better battle ransomware, we must take a page from the lessons learned by the kidnapping and ransom insurance industry in its battle against piracy in the Indian Ocean, Jeremiah Grossman told the AppSec Europe conference in Belfast, Northern Ireland.
Former Bush and Obama cyber adviser Melissa Hathaway says that over the past decade, more than 100 recommendations on improving government cybersecurity have been made but mostly ignored. Now the cybersecurity executive order signed by President Donald Trump will add dozens of new reports in 14 areas.
Microsoft has patched a startling vulnerability in its anti-malware engine, once again demonstrating that security applications can sometimes be the Achilles heel of a system.
The cybersecurity epitaph of the fired FBI director could read: "He showed courage to take on Apple." Comey publicly battled Apple CEO Tim Cook over unlocking the iPhone of the San Bernardino shooter, becoming the face of the proponents who seek ways to bypass encryption on mobile devices.
Hot sessions at this week's OWASP AppSec Europe 2017 conference in Belfast, Northern Ireland, cover everything from the EU's General Data Protection Regulation and fostering better SecDevOps uptake, to quantum-computing resistant crypto and ransomware economics.
A recent patient portal security mishap at a Texas-based cancer testing laboratory is the latest reminder of the need to safeguard sensitive health information on web-based applications and websites.
Not so many years ago, Michael Donaldson was managing a major application for a large enterprise, and when he learned of an unpatched vulnerability, it took him two days to investigate and confirm. With the right tools today, that would take two hours. Listen and learn how.
An examination of the maturing of cybercrime leads the latest edition of the ISMG Security Report. Also, understanding the Intel Active Management Technology flaw.
Reporting software vulnerabilities can be legally dicey, particularly if the affected company has not previously had contact with computer security researchers. A Sydney consultant recently experienced both ends of the spectrum while investigating building management software.
While the federal health data breach tally shows that hacker incidents continue to rise in 2017, regulators are offering up some insights from their investigations into a handful of ransomware-related breaches reported in 2016.
The critical Active Management Technology flaw in many Intel chipsets' firmware can be remotely exploited using any password - or even no password at all - to gain full access to a system, security researchers warn. Numerous systems and even ATMs will require forthcoming firmware fixes.
The U.S. Social Security Administration will implement multifactor authentication starting June 10, sending a passcode via SMS or email. The revised scheme comes after an ill-planned effort last July.
The latest draft version of the Trump administration's cybersecurity executive order is similar to the previous version and lays out a plan to secure U.S. federal government and critical infrastructure IT that could have come out of the Obama White House.
The Department of Homeland Security is warning IT service providers, healthcare organizations and three other business sectors about a sophisticated cyberattack campaign that involves using stolen administrative credentials and implanting malware on critical systems.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.