A Senate bill proposes removing Social Security numbers of U.S. veterans from all Department of Veterans Affairs' information systems within the next five years to help reduce identity theft and fraud. How difficult would it be to make the change?
Despite police disrupting alleged DDoS extortion gangs such as DD4BC, inexpensive stresser/booter services have enabled copycats to continue these attacks, says Akamai's Martin McKeay. Here's how organizations can defend themselves.
The U.S. Securities and Exchange Commission has obtained an emergency court order to freeze the assets of U.K. citizen Idris Dayo Mustapha, who it accuses of hacking into individuals' brokerage accounts to engineer and profit from stock price fluctuations.
Kaspersky Lab says that its original estimate of how many remote desktop protocol server credentials were offered for sale in the now shuttered online cybercrime marketplace xDedic may have been far too low, based on new data coming to light.
With ransomware attacks surging, all organizations should ensure they have an enterprise backup and disaster recovery plan in place, and eliminate all unnecessary, outdated or disused applications and services running on endpoints and servers, says ESET's Mark James.
In the event of a "Brexit" - British exit - from the European Union following this week's referendum, the U.K. would likely still have to comply with EU data protection laws, but also face cybercrime-related policing and prosecution challenges.
A government watchdog warned four federal agencies that they must be more diligent in implementing their cybersecurity programs. Otherwise, some of the government's most sensitive information is at risk of being disclosed to unauthorized individuals.
Even if Radiology Regional Center succeeds in its effort to get a lawsuit related to its paper records breach dismissed, the case serves as a reminder of the critical need for healthcare organizations to safeguard documents as they migrate to digital patient record systems.
Following the SWIFT-focused hack attacks, a U.S. government watchdog agency is auditing the Federal Reserve's effectiveness when it comes to ensuring that U.S. banks have robust information security and data breach prevention programs in place.
In this edition of the ISMG Security Report, you'll hear our editors explore how hackers use Java script for ransomware, the latest digital currency security issue and privacy threats posed by virtual reality.
In recent months, Cloud Access Security Broker solutions have emerged as a defacto, mandatory control. Which is better approach to CASB - proxy or API? Rohit Gupta of Palerra shares his insight and recommendations.
A report that the Russian government hacked into Democratic National Committee systems has security experts warning that just because malware was found on a hacked network, that doesn't mean a specific individual, group or nation-state was involved.