Kentucky is now the 47th state to enact a breach notification law. While a national law superseding the widely varying state statutes is long overdue, the primary election defeat of House Majority Leader Eric Cantor makes passing such a bill tougher.
It's well known that lost or stolen unencrypted computing devices account for the majority of large health data breaches. But a new report from the Department of Health and Human Services shines a light on how frequently breaches - especially smaller ones - involve paper records.
AT&T is notifying an undisclosed number of its customers that their Social Security numbers and other personal information was compromised after employees of a third-party service provider accessed customer accounts without authorization.
A hacker who goes by the handle Guccifer was indicted by a federal grand jury for allegedly breaking into the personal online accounts of high-profile victims, including a family member of two former U.S. presidents.
The loose collective of hacktivists known as Anonymous is taking aim at the 2014 World Cup, waging attacks that are making government websites in Brazil, as well as the sites of corporate sponsors of the event, inaccessible.
Although restaurant chain P.F. Chang's has not yet confirmed a breach, several researchers say they believe the chain suffered a malware attack similar to those that compromised Target, Neiman Marcus and Sally Beauty.
In recent days, three companies experienced distributed-denial-of-service attacks that resulted in significant website downtime. Find out how the organizations are mitigating the impact of the cyber-attacks.
A second economic espionage campaign has been tied to a Chinese military hacking team. But does that attribution help businesses, or just highlight security firms battling for government cybersecurity spending?
When NIST issued "Guidelines on Cell Phone Forensics" in May 2007, Apple's introduction of the iPhone was a month away. Seven years later, NIST is revising its guidance and giving it a new moniker, "Guidelines on Mobile Device Forensics."