Recent dismissals of two class action lawsuits related to an Advocate Health Care data breach spotlight how difficult it can be for plaintiffs to prevail in cases where there is no evidence of damages. But some changes might be on the way.
Canadian authorities are investigating whether a hacker or healthcare insider used a physician's credentials to gain unauthorized access to a British Columbia prescription information network, accessing information on 1,600 patients.
Enterprises should test the processes they establish to respond to advanced persistent threat attacks, just as they vet their business continuity plans, ISACA International President Robert Stroud says.
The National Institute of Standards and Technology should use the cryptographic community to help vet the advice it gets from the National Security Agency when creating cryptography guidance, a panel of prominent experts recommends.
Orangeburg-Calhoun Technical College in South Carolina is notifying 20,000 former and current students and faculty members that an unencrypted laptop computer stolen this month contained their personal information.
Three Chinese nationals seeking to make "big bucks" broke into the computers of Boeing and other military contractors, stealing secrets on transport aircraft, a U.S. criminal complaint says. Read how they allegedly did it.
The Department of Homeland Security confirms that "a potential intrusion" of the Office of Personnel Management's network occurred in March but says officials have not identified any loss of personally identifiable information.
In this week's breach roundup, read about the latest incidents, including a clerical error at a medical center that resulted in letters containing personal information being sent to the wrong recipients.
Most organizations that enable users to perform Web transactions (e.g. banks and ecommerce sites) have implemented security controls to address online and mobile fraud. These controls fall into two buckets: transaction-focused intelligence, which looks for anomalous actions, and device-focused intelligence, which...
Criminals have begun targeting ATMs in Western Europe using malware, as well as a new generation of stealthier skimmers designed to capture card data and PIN codes. But the stolen data is often used for fraud elsewhere, especially the U.S.
Several Blue Shield of California spreadsheet reports inadvertently containing the Social Security numbers of 18,000 physicians and others were released 10 times by the state's Department of Managed Health Care. How could this have been prevented?
The idea of a cyber war council, reportedly proposed by a financial services industry trade group, has not received an enthusiastic reception from cybersecurity experts, some of whom question its viability to defend against cyberattacks.
Attorneys for Target have requested a halt in the discovery process for class action lawsuits stemming from the retailer's December 2013 data breach until the court can consider its forthcoming motions to dismiss most of the suits.