Online outages affecting leading U.S. banking institutions continued Dec. 12, but only U.S. Bank confirmed its site issues were linked to a distributed-denial-of-service attack. Meanwhile, FS-ISAC outlined precautions institutions should take.
In this week's breach roundup, read about the latest incidents, including a California state health department breach involving Social Security numbers posted online and an e-mail hack affecting patients in the Carolinas.
As South Carolina officials figure out how to pay for a tax-system breach, lawmakers plan to introduce legislation as a result of the hack. Meanwhile, Gov. Nikki Haley, the face of the state's breach response, is seen unfavorably by a majority of surveyed residents.
A day after Izz ad-Din al-Qassam Cyber Fighters announced plans for a second wave of DDoS attacks, SunTrust, Bank of America and PNC experienced intermittent site issues, and U.S. Bank acknowledged the new threat.
Izz ad-Din al-Qassam Cyber Fighters has announced the "second phase" of its hacktivist campaign, saying five major U.S. banks will be the victims of new distributed-denial-of-service attacks starting this week.
From point-of-sale hacks to malware and DDoS attacks, the top cyberthreats of 2012 have been aggressive and strong. Is it time for organizations to adopt a "hack back" strategy against perceived attackers?
Former FBI cyber unit chief Tim Ryan sees mounting dangers from the insider, acknowledging undiscerning employees who don't follow proper processes can cause devastation. But he says the actions of those with malicious intent can be more catastrophic.
Curbing pay-at-the-pump card skimming attacks is daunting, and incident tracking is to blame. But a new initiative spearheaded by the oil industry and card issuers raises the bar for information sharing.