A list of "super user" passwords - and a default username - now circulating online appears to allow unauthorized access to some webcam video streams, security researchers warn. If confirmed, it would be yet another massive internet of things security failure by a device manufacturer.
Leading this latest edition of the ISMG Security Report: The growing momentum in Congress to establish a select committee to investigate breaches the American intelligence community has tied to the Kremlin to influence the U.S. presidential election.
Organizations in all sectors need to be aware of newly emerging insider threats, including those tied to the dark web, Michael Theis of Carnegie Mellon's CERT Insider Threat Center explains in this video interview.
To combat breaches involving insiders, organizations need to limit employees' access to data and more closely monitor access activity, security expert David Gibson of Varonis says in this video interview.
Prolific hacker Samy Kamkar's latest creation shows how even locked computers can be hacked quite easily, providing further justification for security leaders to block users' computer USB ports.
Following recent data breaches, some Indian banks are advertising for cybersecurity and forensics specialists to work with their CISOs. But finding qualified staff could prove challenging.
Internet of things security takeaway: Save yourself, and by doing so, maybe help save the rest of us too. That's the obvious takeaway from the rise of low-tech, high-impact Mirai malware, which has been tied to the record-setting Oct. 21 DDoS attack against Dyn.
There are two Yahoo conspiracy theories: It was hacked by a "state-sponsored actor," and it disabled email forwarding to prevent a post-breach exodus. Although neither scenario appears to be true, that doesn't mean the badly breached search giant is in the clear.
Former NSA contractor Harold T. Martin III., who is accused of pilfering mass quantities of highly classified information, will remain in jail until his trial. Martin engaged in "a course of felonious conduct that is breathtaking in its longevity and scale," prosecutors say.
Cybercriminals are continuing to refine their art: Researchers say there are now more than 200 ransomware families, which complicates ongoing attempts to disrupt such attacks.
A new audit that uncovered numerous problems with the U.S. Secret Service's IT management is "alarming," says House Oversight Chairman Jason Chaffetz, a victim of a Secret Service insider breach.
Under Australia's strict definition of a cyberattack, the country has never actually experienced one. The claim underscores ongoing questions about how to describe cybersecurity incidents.
An NSA contractor who worked for Booz Allen Hamilton has been accused of stealing top-secret documents that the U.S. says could endanger national security. The documents are critical to a "wide variety of national security issues," the Department of Justice says.
The handling of a recent data breach - the details of which are still unfolding - by Oakland, Calif.-based web services company Regpack provides a look into how the discovery and disclosure of a breach can turn into a real train wreck.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.