The social media savvy Islamic State frightens most of the world with its gruesome Internet postings of executions and online recruitment of new Jihadists. But is the terrorist group likely to launch cyber-attacks?
Security experts are warning that millions of systems - Apache servers, Linux and Mac systems, and innumerable Internet of Things devices - may be vulnerable to a flaw in Unix that attackers are already using to gain shell access.
The Modi government's "Jan Dhan Yojana" is ambitious, and security concerns are vast. Awareness, complexity and scope must be addressed, says Pervez Goiporia, vice president, IDM development, at Oracle India.
FS-ISAC has teamed up with the Depository Trust and Clearing Corp. to offer software designed to ease cyberthreat information collection and sharing, helping safeguard against cyber-attacks.
Banking Trojans are increasingly being repurposed for espionage purposes. Recent victims of modified banking malware include a chemical manufacturer as well as an unknown number of Salesforce users.
Security experts analyze the latest details that big-box retailer Home Depot provided about a breach that exposed 56 million payment cards. A hot topic: the nature of the malware used in the attack.
How banks and law enforcement can work together to fight global cybercrime was a hot topic at our Fraud Summit Toronto. And the discussion will continue at our Sept. 23 summit in London.
McAfee's Michael Sentonas and Sean Duca discuss emerging threat vectors, sharing how cybercrime impacts the landscape and how lessons from recent global breaches can be applied to the Indian context.
A cross-site scripting vulnerability at eBay.co.uk left an undetermined number of users susceptible to an attack that attempted to steal their credentials when they clicked on links within a listing offering a used iPhone for sale.
Apple announces security and privacy changes tied to the release of iOS8, including better data encryption, more secure iCloud backups, and a corporate promise to be more transparent. But it delays release of its HealthKit.
Federal government auditors have identified weaknesses in the technical controls protecting the security of the federally run Obamacare HealthCare.gov website and systems, which they say create increased and unnecessary risks.
Israeli Prime Minister Benjamin Netanyahu may have been a bit premature to claim Israel has deployed a cyber "iron dome" to protect its critical IT and defense systems. But a new initiative under way will try to do just that.
C&K Systems, the vendor identified by Goodwill as the source of a breach that impacted about 330 of its stores, has confirmed details of the 18-month breach of its "hosted managed services environment" affecting three of its clients.
When IBM unveiled BIOS - Basic Input/Output System - in 1981 with the introduction of its personal computer, few perceived it as a security threat. But now, NIST has issued a new guide to mitigate BIOS vulnerabilities in servers.
Experts review new allegations that have emerged about information security practices at Home Depot in the wake of the retailer confirming that it suffered a data breach resulting in the theft of an unknown quantity of credit and debit cards details.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.