Vermont's $30,000 settlement with a breached retailer proves states can play an important role in holding retailers more accountable for losses associated with card fraud, and issuers should take notice, one banker says.
Russian authorities have reportedly arrested a man believed to be the author of the Blackhole exploit kit, widely used by cybercriminals to exploit vulnerabilities in Web browsers and other software to infect user computers with malware.
Despite the recent lull in al-Qassam Cyber Fighters' DDoS attacks against U.S. banks, the ABA's Doug Johnson and FS-ISAC's Bill Nelson warn banks to avoid complacency, noting that DDoS attacks pose an ongoing threat.
Organizations in all sectors should take steps now to avoid security and operational risks associated with Microsoft's plans to discontinue support of the Windows XP operating system next year, security experts say.
Communication is key in the wake of a cyber-attack, says Dennis Simmons of SWACHA, who explains how simulated attack drills will help banks overcome their information sharing challenges.
Randy Trzeciak and his CERT Insider Threat Center colleagues are working to broaden the definition of the insider threat to incorporate not just the risk to information and IT but to facilities and people, too.
Adobe is notifying 2.9 million customers that their personal information has been compromised as a result of a breach into the software company's network. Source code for numerous products was also illegally accessed.
In this week's breach roundup, read about the latest incidents, including unauthorized access to electronic patient records at an Iowa health system and an ID theft case at a medical imaging school.
Cybersecurity experts say perceived disruptions caused by the shutdown could encourage America's cyber-adversaries to increase their attacks and probes on federal government IT systems and networks.
In the wake of an ongoing stream of merchant and payment processing breaches, the FDIC is reminding smaller banking institutions that they are ultimately responsible for ensuring the security of cardholder data.
The State Department's top cyberdiplomat, Chris Painter, explains how the United States is helping other nations beef up their laws and policies to battle cybercrime and improve international collaboration on cyberthreats.
With the prospect of a federal government shutdown, and its implications for IT security, it's worth considering what happened in Minnesota two years ago, when a similar budget squabble shuttered state operations for 20 days.
It's been four years since federal officials began tracking major healthcare data breaches. What important lessons can be learned from the causes of these breaches as well as HIPAA enforcement actions by federal regulators?
Too many organizations are spending far too much money on gathering big data that they cannot put to good use, such as for fraud prevention, says IDC analyst Jerry Silva, who stresses that investments must have strategic value.
ISACA has issued a new information risk management framework - COBIT 5 for Risk - that provides 20 scenarios to help organizations better mitigate risk. The scenarios include more than 100 risk types.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.