Twitter is suing the federal government, seeking to pave the way to publish its transparency report that documents the government's requests for user information.
Yahoo confirms Shellshock-targeting attackers hacked into three of its servers, but claims they didn't exploit Bash flaws. Meanwhile, Lycos denies it's been breached and WinZip isn't responding directly to a report that it was hacked.
An important lesson to learn from the massive JPMorgan Chase breach is that banks can't just focus on protecting card data and online banking accounts; they also must protect their customers' personally identifiable information.
Shellshock threats continue to escalate, with security researchers now counting 11 types of exploits that target the Bash flaws. Yahoo, Lycos and WinZip are reportedly among the "Bash attack" victims.
The hackers who breached JPMorgan Chase also infiltrated about nine other financial institutions, and may be operating from Russia, according to one news report. But security experts caution against jumping to conclusions over attackers' identities or motives.
The development of authentication technologies that could replace the password is "nearing a tipping point," but there's still several years of work to do, says Jeremy Grant, who oversees the National Strategy for Trusted Identities in Cyberspace.
"Selling spyware is not just reprehensible, it's a crime," says a U.S. Justice Department official. So why are 245 local U.S. law enforcement agencies and prosecutors giving spyware away for free?
The Justice Department announces that four alleged members of an international hacking ring have been charged with stealing intellectual property valued at $100 million, including a U.S. Army Apache helicopter simulator and Microsoft Xbox prototypes.
In the wake of this week's news that a second point-of-sale breach has struck grocery chain Supervalu, experts warn many more retailers are likely to suffer a similar fate. Find out why.
The CEO of a Pakistani software company has been charged with developing, selling and advertising spyware for illegal purposes. But a legal expert questions whether those charges will stick.
The automated version of the IT risk management and governance framework should save project leaders 30 to 60 hours of work over a manual process of building a secure IT system, ISACA President Robert Stroud says.
As the workforce increasingly relies on mobile devices, corporate privacy and security policies aren't keeping pace. And that's leaving a large gap in organizations' breach prevention strategies.
More than 1.5 million DDoS attacks daily are targeting the Bash bug flaws known as Shellshock. Researchers have now discovered a total of four Shellshock vulnerabilities and warn that more may follow.
In a wide-ranging interview, the acclaimed expert on cybersecurity strategy addresses the cyberthreat posed by ISIS and explains why Congress is unlikely to enact significant cybersecurity legislation this year.
As news of the Shellshock bug continues to spread, CISOs in all sectors are taking steps to mitigate the risks posed by the vulnerability. Likewise, regulators and industry groups have ramped up dissemination of alerts.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.