The FBI has arrested a former manager at Machine Zone, which makes the multiplayer "Game of War: Fire Age," over allegations that he attempted to bargain sensitive corporate information for a better severance package.
Although EMV is a far more secure payments technology, it can be exploited for fraud if it's improperly implemented, warns Gartner analyst Avivah Litan. What security lessons must be learned from past EMV deployments?
The FDIC says cybersecurity is a business continuity issue. So it's offering banks a series of videos and exercises to help them address key threats, including account take-over, malware infections and other risks related to third parties.
CISOs who want to keep more cyber-attacks from succeeding should focus on decreasing the half-life of vulnerabilities, which refers to the amount of time it takes half of all systems affected by a vulnerability to get patched. That's the advice from Qualys' Wolfgang Kandek.
Is a hackable car defective? The auto industry likens hack attacks to troublemaking. But legislators and regulators are taking a closer look at connected cars and the safety risks posed by software bugs.
An appellate court has upheld the Federal Trade Commission's authority to play a key regulatory role in cybersecurity as it relates to the protection of consumer data against breaches. Legal experts evaluate the long-term implications.
Breached dating site Ashley Madison is offering a $500,000 reward for information relating to the attack. The FBI, which is leading the investigation, is treating the breach as a national-security matter.
Three years after hacktivists targeted U.S. banks with a series of DDoS attacks, the size and magnitude of attacks continue to grow, but they're now more likely to be designed to facilitate fraud. Here's an update on the status of banks' mitigation strategies.
The Ashley Madison hackers have released a third data dump, and security experts warn that spam campaigns and extortion attacks now target supposed users of the dating site, sometimes demanding bitcoins - or else.
Extortionists and "free agent" rogue insiders have emerged as the top two most malicious cybercrime threats to banking institutions, says Gartner's Avivah Litan. How should institutions bolster their defenses?
To help mitigate the risk that blackmail and extortion campaigns might target employees, employers' security teams must regularly review post-breach data dumps as well ramp up enforcement of their corporate security policies, says Stephen Coty of Alert Logic.
Rand Corp.'s Martin Libicki sees circumstances in which a weaker economy could curtail Chinese cyber spying on U.S. companies. Then again, he says, the Chinese government could see spending money on hacking as an economic stimulus.
Stock markets in the United States, Europe, China and India continued their volatility Aug. 24, and it's not clear how cybersecurity stocks will weather the downturns. But with hack attacks not letting up, some analysts say cybersecurity companies will likely continue to thrive.