Security experts trace many of the world's cybercrime attacks to Russia. But Russian authorities never extradite suspects, and they allow hackers to operate with impunity - if they play by some ground rules.
If the Chinese government hacked the U.S. Office of Personnel Management for espionage purposes, then the U.S. government's $133 million contract to provide ID theft monitoring services is a waste of money. Instead, the agency could have used the funds to safeguard its systems against future attacks.
After hosting the ISACA Mumbai Chapter Conference back in 2013, I was asked again this year, and didn't think twice. Here are some of my observations from two days of talking security with key thought-leaders.
Organizations think they have done everything right, yet still they are breached. What has gone wrong? RSA's CTO Zulfikar Ramzan says it's time for security practitioners to shift to a new prevention mindset.
A lawsuit filed against information services firm Experian alleges the company failed to detect that a customer of its data aggregator unit was a fraudster. Could stronger customer vetting have prevented misuse of information?
A day after the Office of Personnel Management confirmed that security breaches exposed to hackers the personal information of more than 22 million individuals, Katherine Archuleta has resigned as director of the agency.
As the U.S. Office of Personnel Management total breach victim count hits more than 22 million, many lawmakers are calling for the OPM's director to be fired. Meanwhile, the White House says it's weighing its response against the hackers responsible.
A breach of an U.S. Office of Personnel Management system used to conduct security clearance background checks exposed the personal information of 21.5 million individuals, the agency announced July 9.
FBI Director James Comey says the White House plans to confirm that the U.S. Office of Personnel Management data breach exposed "millions and millions" of background-check records. Meanwhile, a second union has now sued OPM over the breach.
Caffeine junkies are up in arms over reports that criminals have been targeting their Starbucks account balances. But the real story is poor password-picking practices by consumers, and Starbucks' lack of multi-factor authentication.
Laws rarely, if ever, keep up with technology, but even if they could, the consequences could prove more harmful than the benefits. That was evident at a House hearing that addressed default encryption of mobile devices.
To mitigate the threat posed by malicious insiders or attackers who compromise real users' credentials, businesses must create and monitor a baseline of legitimate user behavior and activities, says Idan Tendler, CEO of Fortscale.
Mattel will sell a cloud-connected $75 "Hello Barbie" doll that can "listen" to what kids are saying and talk back. But security experts warn that anything that connects to the Internet can - and will - be hacked.
Hackers have been stealing the secret trading algorithms that are the lifeblood of many hedge funds and high-frequency trading firms, according to two security companies. What can be done to mitigate the risks?
In the aftermath of a payment card breach, as fraudsters race to exploit the stolen information, card issuers and affected customers take steps to mitigate risks. Here's a look at the lifecycle of a payment card breach from three perspectives.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.