A report on the implications of failing to notify manufacturers of security flaws in their medical devices and a conversation with internet co-founder Vint Cerf highlight the latest edition of the ISMG Security Report.
In their quest for easy ways to extort victims into giving them bitcoins, cybercriminals continue to double down on crypto-ransomware attacks and increasingly target enterprises, seeking proportionally higher paydays.
To the annals of super-bad historical mega breaches that no one knew about, add two new entries: Dropbox and Last.fm. Hackers reportedly stole tens of millions of usernames and passwords from each in 2012.
Data centers are difficult to defend, and securing the perimeter is important but of little consequence if attackers get inside. But there are ways to lock down data centers, former White House strategist Nathaniel Gleicher explains in this interview.
At least some of the alleged cybersecurity vulnerabilities in St. Jude Medical cardiac devices that were found by research firm MedSec Holdings don't necessarily translate to serious clinical risks for patients, says medical device security expert Kevin Fu.
Following the $81 million Bangladesh Bank hack, "persistent, adaptive and sophisticated" attackers have continued to compromise banks' local security controls to send fraudulent money-moving messages via SWIFT's interbank messaging network, and, in some cases, successfully steal money, SWIFT warns.
While the push for security in regulated industries is compliance driven, it's essential for organizations to also develop security strategies based on business risks, says A. Shiju Rawther, head of infrastructure and security operations at a leading credit-rating bureau in India.
Brazen ATM thefts from financial institutions in Taiwan and Thailand have sent a shiver through the global banking industry. An inside look at the malware used in the attacks reveals attackers' clever, incremental improvements.
Intelligence agencies sometimes seek out and develop exploits for the very technology that their nation's organizations rely on to secure their data. In an interview, cybersecurity expert Alan Woodward offers insights on how information security professionals should respond.
In an interview, Internet pioneer Vint Cerf says he sees a secure future for the network of networks he helped create four decades ago as the co-developer of TCP/IP, the protocol that facilitates internet communications.
To keep up with emerging threats, banks and other organizations in Saudi Arabia and throughout the region must develop much more mature incident response functions, says Mohammed Almozaiyn, who heads incident response for a leading Saudi bank.
Many Asia-Pacific organizations are woefully unprepared to detect and respond to data breaches, according to Mandiant's M-Trends Report 2016. In fact, the report finds that the median amount of time it takes to discover an attack in the region is 520 days.
Cisco has begun releasing updates for all ASA devices to patch them against a buffer overflow vulnerability that was targeted by leaked Equation Group attack tools. Attackers can exploit the flaw to gain remote control of ASA devices.