Two zero-day vulnerabilities reportedly were exploited by the attackers who hacked NASDAQ's systems in 2010. While a senior U.S. legislator claims the hackers had "nation-state" backing, security experts say it's still not clear who hacked NASDAQ or why.
A security expert and average consumers respond differently to the eBay breach. As most customers retain a high degree of faith in online merchant security, the expert believes eBay committed a serious sin in its lack of strong authentication.
From Neiman Marcus to P.F. Chang's, 2014 has shaped up to be the 'Year of the Data Breach.' What lessons can be gleaned from the trenches of breach investigation? Experian's Michael Bruemmer shares tips.
TotalBank, a subsidiary of Banco Popular that has 21 locations in South Florida, is notifying 72,500 customers that their account information was potentially exposed after an unauthorized third party gained access to the bank's computer network.
Treasury Secretary Jacob Lew this week took the precedent-setting step of publicly addressing the financial system's cybersecurity shortcomings. Learn why one expert says this could represent a policy shift for the Treasury Department.
Prosecutors in Texas have taken the rare move of pursuing criminal charges against an individual for alleged HIPAA violations. The case is a reminder that health workers can face prison time and hefty monetary fines for wrongful disclosures of PHI.
Recent dismissals of two class action lawsuits related to an Advocate Health Care data breach spotlight how difficult it can be for plaintiffs to prevail in cases where there is no evidence of damages. But some changes might be on the way.
Canadian authorities are investigating whether a hacker or healthcare insider used a physician's credentials to gain unauthorized access to a British Columbia prescription information network, accessing information on 1,600 patients.
Enterprises should test the processes they establish to respond to advanced persistent threat attacks, just as they vet their business continuity plans, ISACA International President Robert Stroud says.
The National Institute of Standards and Technology should use the cryptographic community to help vet the advice it gets from the National Security Agency when creating cryptography guidance, a panel of prominent experts recommends.
Orangeburg-Calhoun Technical College in South Carolina is notifying 20,000 former and current students and faculty members that an unencrypted laptop computer stolen this month contained their personal information.