"Cybercrime as a Service" is the latest threat evolution, and traditional defenses continue to fall short. Derek Manky of Fortinet discusses the merits of information sharing and the new Cyber Threat Alliance.
At least 12 million home and small-office routers from 50 manufacturers have a flaw that an attacker could remotely exploit to seize control of the device, steal data and redirect users to attack sites, warns security vendor Check Point.
Who hacked Sony Pictures? While the FBI still says North Korea ordered the online attack, new evidence suggests the hack may have been the work of insiders or hacktivists, and Russian-speaking attackers may have been involved.
The relative anonymity afforded by using the cryptocurrency known as Bitcoin appears to be in jeopardy, making it potentially less attractive for use in connection with cybercrime.
The Union Home ministry has formed a five-member panel to devise a roadmap to tackle cybercrime. But do the members have the experience necessary to fulfill the mission? Security experts express reservations.
North Korea criticizes President Obama for backing the release of a comedy about the assassination of its leader, denies ordering the hacking of Sony Pictures and blames the U.S. for its Internet and mobile network outages.
Distributed-denial-of-service attacks, fueled by the interconnected nature of smart devices, will only continue to increase, says Matt Moynahan, president of Arbor Networks. "The infrastructure itself is insecure," he says.
Driven by the spectre of external threats, attacks and growing business expectations, can CISOs focus on risk management and take a more integrated and systematic approach to defend against attacks?
While the FBI may have attributed the hack attack against Sony Pictures Entertainment to North Korea, many information security experts remain unconvinced, based on the evidence that's been released to date.
The Sony data breach is the top security news story of 2014, and ISMG has provided thorough coverage of the incident. Following is a comprehensive guide to Sony breach news, analysis and commentary.
After the complete collapse of network security at Sony Pictures - in the wake of its data breach - it's important that we highlight some of the organization's fundamental security mistakes. Here's a macro view of the lessons we must all learn.
Once a file enters the network, we often lack the tools to monitor the file's behavior. In essence, using the point-in-time model, the security professional cannot retry the file for guilt or innocence.
Seeking a measured response to an attack on a non-critical infrastructure company requires carefully balancing a strong message to North Korea with one that doesn't result in escalating an encounter with a rogue nuclear nation.
While the FBI blames North Korea for the hack attack against Sony Pictures, security expert Carl Herberger says the attack differs from previous nation-state attacks. Learn how organizations must shift defenses.
The response by Sony Pictures Entertainment executives to the hack attack against their company provides a number of great examples for how to not to handle a data breach. Here are 7 key mistakes they made.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.