The Anthem breach, which possibly started with a phishing campaign, is a prime example of how hackers are perfecting their schemes to target key employees who have access to valued information, says Dave Jevans of the Anti-Phishing Working Group.
Anthem believes that the breach that has exposed up to 80 million individuals' information possibly began after a handful of employees fell victim to a phishing attack. Other attackers appear to be using the breach as a lure for their own phishing campaigns.
As state insurance commissioners and attorneys general launch investigations into health insurer Anthem's data breach, a U.S. Senate committee is examining the healthcare industry's preparedness for mitigating cyberthreats.
According to the latest statistics, the State of Kerala experiences at least one cybercrime every two hours. What are the factors behind this sudden increase, and how can security leaders curb the trend?
As health insurer Anthem's breach investigation progresses, some news reports are already pointing the finger at Chinese hackers as the possible culprits. But in this early stage of the investigation, security experts urge skepticism about attribution.
The massive cyber-attack against health insurer Anthem makes it crystal clear that the healthcare sector has become a new favorite target for hackers. So what needs to be done to defend against hacks?
News that health insurer Anthem Inc. suffered a massive breach after hackers gained access to a corporate database illustrates yet again the healthcare sector's vulnerability. This infographic takes an updated look at the top five health data breaches.
Health insurer Anthem Inc. has suffered a massive data breach after hackers gained access to a corporate database reportedly containing personal information on as many as 80 million of its current and former U.S. customers and employees.
An upcoming series of summits on fighting financial fraud and mitigating advanced persistent threats will provide timely insights from industry thought leaders on the critical steps to take to address emerging risks.
Russian and European malware and spam purveyors have been hijacking Internet routes. Pending a massive infrastructure upgrade, security experts warn that such attacks can be detected, but not easily blocked.
A new report claims that Russian hackers, using spear-phishing attacks, breached the Sony Pictures Entertainment network by November 2014. But it's not clear whether they were responsible for the "G.O.P." attacks attributed by the FBI to North Korea.
Email fraud has existed since the advent of email. But the schemes are evolving and impacting organizations' bottom lines. Robert Holmes of Return Path offers new strategies to defeat fraud attempts.
Target Corp. has replaced its "interim" CIO, who was named to the post last year following its massive 2013 data breach that compromised 40 million credit card numbers and exposed personal details on 70 million customers.
Gartner analyst Sid Deshpande portrays a positive picture of increased security spending, deployment of focused security technologies and a concerted approach to streamline security infrastructure in 2015.
President Obama says his proposed cybersecurity budget is designed to help prevent foreign nations or hackers from shutting down American networks, stealing trade secrets or invading the privacy of American families.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.