Universities remain prime targets for hackers due to their data-rich environments. Maintaining a culture of openness while ensuring the security and privacy of sensitive information will be an ongoing challenge for the education sector.
Eighty-six percent of Indian security practitioners agree there's an acute shortage of skilled cybersecurity professionals. What should be done to fill the gap? And what are the risks if we don't?
Visa executive Kimberly Lawrence contends that the ongoing U.S. migration to EMV is progressing more rapidly than in other markets that have made the transition, requiring outside-the-box rules for debit transactions and cardholder verification.
President Obama says his proposed cybersecurity budget is designed to help prevent foreign nations or hackers from shutting down American networks, stealing trade secrets or invading the privacy of American families.
For the third time in recent weeks, in-the-wild attacks are exploiting a newly discovered zero-day vulnerability in
Adobe's Flash plug-in for Web browsers, Trend Micro reports.
Hackers posing as women on Skype tricked Syrian opposition fighters into infecting their systems with malware, which furnished the hackers with "valuable insight into military operations," according to a new report from cybersecurity firm FireEye.
Recognizing the behavior of an intruder, rather than relying on digital signatures, will prove to be a better way to prevent hackers from pilfering data and creating havoc in IT systems, says Radware CEO Roy Zisapel.
The Russian online dating site Topface says it has made a payment to a hacker who discovered a vulnerability on the site that enabled him to breach it, exposing 20 million e-mail addresses.
Even a few weeks after the RBI announced its plan to consider removal of the two-factor authentication requirement for small-value transactions, security critics continue to react strongly against the notion.
Starting in April, Singapore plans to have a dedicated and centralized cybersecurity agency. But experts question whether the agency can take a holistic approach and effectively coordinate with industry.
Leading this week's industry news roundup, IBM announces Identity Mixer, a cloud-based encryption technology designed to protect personal data online, while Proofpoint releases its Enterprise Protection Suite 8.0.
Chinese authorities reportedly want foreign software and hardware vendors that sell to its banking sector to share source code and encryption keys. Western technology firms have reacted with alarm.
As the use of consumer health devices and applications grows, so do privacy and security concerns, says a new Federal Trade Commission report. Learn about the precautions the FTC recommends.
IBM Trusteer malware researcher Ori Bach says financial fraud attacks coming out of Brazil are having a global impact, and he offers insights and lessons for banking institutions throughout the world.
Lawmakers are more serious than ever about cybersecurity legislation. Their intent is to enact, but can they compromise on legislation to share cyberthreat information and nationalize data breach notification?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.