The Ashley Madison hackers have released a third data dump, and security experts warn that spam campaigns and extortion attacks now target supposed users of the dating site, sometimes demanding bitcoins - or else.
Extortionists and "free agent" rogue insiders have emerged as the top two most malicious cybercrime threats to banking institutions, says Gartner's Avivah Litan. How should institutions bolster their defenses?
To help mitigate the risk that blackmail and extortion campaigns might target employees, employers' security teams must regularly review post-breach data dumps as well ramp up enforcement of their corporate security policies, says Stephen Coty of Alert Logic.
Rand Corp.'s Martin Libicki sees circumstances in which a weaker economy could curtail Chinese cyber spying on U.S. companies. Then again, he says, the Chinese government could see spending money on hacking as an economic stimulus.
Stock markets in the United States, Europe, China and India continued their volatility Aug. 24, and it's not clear how cybersecurity stocks will weather the downturns. But with hack attacks not letting up, some analysts say cybersecurity companies will likely continue to thrive.
One security expert says the highly-publicized breach of online dating website Ashley Madison appears to include the exposure of sensitive, personal details relating to between 100,000 to 150,000 registered customers in India.
In the wake of U.S. and Indian discussions to develop a common response to combat cyber-threats, India's security leaders say a new, systematic approach is needed to define the nation's cyber defense model.
The Ashley Madison mega-breach differs from previous breaches not just because of its scale, but also the fallout facing victims of the breached infidelity-focused dating site. Here are the top information security takeaways.
In the wake of the discovery of the serious Android Stagefright flaws, which affect an estimated 950 million devices, security researchers reveal that they discovered yet another Stagefright flaw - and that Google's initial fix could be exploited.
Blue Coat CTO Dr. Hugh Thompson speaks about the future of security, the constants that need attention, and lessons to be learned from the U.S. when it comes to writing meaningful breach notification laws.
Security risks of real-time mobile payments increase as adoption of mobile devices and applications grow. PwC's Suhas Desai shares risk mitigation strategy through application and mobile security best practices.
The legal climate around cyberspace is gaining maturity, with nations such as China looking at the domain as being an integral part of national security. Cyber law expert Pavan Duggal shares insight on this evolution.
Application Programming Interfaces have security vulnerabilities that pose significant business risk. CA's Vic Mankotia cautions security leaders about how they manage APIs to secure digital identities.
The Internal Revenue Service says cyber thieves may have accessed as many as 334,000 taxpayer accounts in a breach of its Get Transcript system, far more than the 114,000 accounts it originally estimated in May.