Authorities say Yevgeniy Aleksandrovich Nikulin stole credentials from a LinkedIn employee and used them to breach the social networking firm in 2012, in which well over 100 million members' passwords were exposed.
Some 3.2 million Indian debit cards may have been compromised, according to the National Payments Council of India. While investigations are ongoing and several banks have reissued at-risk cards, the source of the card exposure has not been officially confirmed.
Former NSA contractor Harold T. Martin III., who is accused of pilfering mass quantities of highly classified information, will remain in jail until his trial. Martin engaged in "a course of felonious conduct that is breathtaking in its longevity and scale," prosecutors say.
Experts evaluating the likelihood of a hack to alter votes in this year's American presidential election highlights the latest edition of the ISMG Security Report. Also, U.S. federal regulators propose new cybersecurity rules for big banks.
Yahoo, now negotiating its sale to Verizon, has posted an increase in quarterly profits and page views, bolstering its case that its massive data breach didn't irrevocably damage its value. But with ad revenues in decline, time is running out.
Russian hackers may think twice before traveling outside the country for a vacation in light of the arrest of alleged 2012 LinkedIn hacker "Yevgeniy N." by Czech police at a restaurant in Prague earlier this month.
As organizations in India scramble to keep up with emerging cyber threats, implementing an intelligence-driven security operations center is proving to be essential, Gartner analyst Rajpreet Kaur says in this in-depth interview.
In the wake of cyberattacks, federal regulators are proposing tough new standards designed to bolster cybersecurity at the nation's largest banking institutions.
U.S. Presidential candidate Donald Trump's business organization downplayed a finding from a UK-based researcher that the organization uses, in some cases, decade-old email software, posing significant cybersecurity risks.
While hitting back may be satisfying and worthwhile to some, whether and how to do it is hardly a simple matter. Many questions need to be addressed, perhaps answered before going ahead.
Some security experts say the Singapore Cyber Security Agency's new strategic blueprint for creating a resilient and trusted cyber environment lacks a practical approach to addressing key risk issues.
A search warrant executed earlier this year gave authorities the power to force occupants of a Los Angeles-area house to unlock devices with their fingerprints, casting doubt on biometric defenses.
IoT devices running the authentication protocol OpenSSH are being compromised and used as proxies in attacks that aim to take over accounts at popular web services, according to new research from Akamai.
A malware-wielding gang has been targeting financial firms' SWIFT software to inject fraudulent money-moving messages since at least January in "discreet campaigns" not tied to the Bangladesh Bank hack, Symantec warns.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.