Computer networks in nations where the government has ratified international cyber-agreements have lower incidents of malware infection, says Paul Nicholas, Microsoft senior director of global security strategy and diplomacy.
TD Bank and Keybank confirm that their online-banking sites were hit by DDoS strikes last week. And one security expert says other banks were hit by sophisticated attacks as well.
What can organizations do to improve security after a network attack? Post-breach investigations help security leaders trace steps and strengthen weak points, says investigator Erin Nealy Cox.
The main takeaway from a House hearing this past week was that the biggest information security problem most small business operators face is that they're unaware they have an IT security problem.
The motive behind the cyber-attack on South Korean banks and broadcasters was atypical, as compared to most digital assaults that involve implanting malware on IT systems, says McAfee's Vincent Weafer.
A rapidly evolving threat landscape calls for the next generation of information security professionals to have strong technical and communications skills. Security leaders highlight their top requirements.
Conventional wisdom suggests China isn't interested in disabling industrial control systems in the U.S. After all, such an act would be against its own economic interest. But is that type of thinking right?
A 26-year-old former web producer charged with helping Anonymous hack into the website of the media giant Tribune Co. provided members of the hacktivist group with log-in credentials for a computer server, according to federal authorities.
A software vulnerability brought down the website that gives the public access to the National Vulnerability Database, which is run by the National Institute of Standards and Technology, the U.S. federal agency that produces information security guidance.
Most people will remember March 13, 2013, as the day Cardinal Jorge Bergoglio ascended to the papacy as Pope Francis. But for those who consider cybersecurity vital for society's well-being, it's an historic date as well.
Prolexic's CEO Scott Hammack says battling distributed-denial-of-service attacks has become part of everyday business. And during this in-depth interview, he explains why.
Internet visionary Vint Cerf sees the development of strong authentication for the billions of devices connected to the Internet as the IT security community's next big challenge.
In notifying customers of a breach, the online archiving service Evernote might have confused some customers by sending them an e-mail that contained a clickable link to be used to reset passwords - despite warning against using such links.
Bank of America confirms hacktivists' reports about a breach of a third-party service provider working with the bank to analyze public data. How did the breach occur, and what information was exposed?
Consumer advocate Deven McGraw describes how a new federal rule spells out four factors that must be weighed in a risk assessment to determine if a health data breach must be reported.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.