Instead of sabotage, as Stuxnet was used on Iranian nuclear centrifuges, Duqu is designed to gather intelligence that could help attackers mount a future digital assault on industrial control facilities.
Facial recognition, arguably, is the technology that most threatens individual privacy online, and that's on the mind of Senate Commerce Committee Chairman Jay Rockefeller, who has asked the FTC to report on its growing use.
Investigators have linked a retail-credit scheme to a pair of fraudsters who are believed to have stolen $9 million from 8,000 victims. How could such a scheme go undetected for 15 years?
The Department of Defense and two other government agencies have issued a proposed rule designed to help ensure that government contractors provide adequate privacy training to their staff members.
Aggressive HIPAA enforcement, as well as compliance education, are top priorities for Leon Rodriguez, the new director of the Department of Health and Human Services' Office for Civil Rights.
A Pasco County, Fla., man has been charged for his involvement in a summer skimming spree that targeted Bank of America ATMs. Why do authorities believe he likely has connections to an international crime ring?
"This guidance ... will allow the market to evaluate companies in part based on their ability to keep their networks secure," Sen. Jay Rockefeller says. "We want an informed market and informed consumers, and this is how we do it."
Yet another breach incident involving the theft of computer storage media from a vehicle was added to the official federal tally of major health information breaches this week.
A class action lawsuit is seeking $4.9 billion in damages as a result of alleged privacy violations stemming from a recent health information breach affecting beneficiaries of the TRICARE military health program.
While a presidential advisory council wants to move forward quickly with using metadata tags within electronic health records, such as to indicate patient privacy preferences, another federal advisory panel is saying "not so fast."
Two recent major breach incidents call attention to the value of encrypting backup tapes. A new survey shows how many organizations are taking this precaution.
When Mano Paul of (ISC)2 discusses today's top application security challenges, he draws an analogy with sharks. And what he views as the skills needed to tackle today's top threats might surprise you.
Winn Schwartau says the BlackBerry disruption this past week (see BlackBerry Disruptions: Where to Start?) hit at the heart of one of the fundamentals of IT security: availability.
Don't be too fast to blame Research In Motion for the disruption in BlackBerry service if your organization suffered from the lack of e-mail exchanges. It could be partly your fault, too, says noted infosec lawyer Francoise Gilbert.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.