Global Payments Inc., the breached payments processor, now says the scope of its self-discovered data breach may be broader than initially reported and involve personal data collected from merchant customers.
It's the everyday attacks, not the Flames, that are most likely to put an organization's IT infrastructure in jeopardy. Here is advice for how organizations can staff up and improve cybersecurity.
Developing a culture of responsibility could go a long way in helping business, not-for-profits and governments secure their organizations' information resources.
How can organizations mitigate increasing cybersecurity risks posed by hacktivist groups and organized crime? Verizon's Chris Porter offers recommendations.
Four recent breach incidents, including one affecting LinkedIn, have put the spotlight on the effectiveness of hashing. Why is hashing increasingly ineffective at protecting online passwords?
LinkedIn, the social network that's investigating the pilfering of nearly 6.5 million of its members' passwords, has neither a chief information officer nor chief information security officer.
The online dating website eHarmony has warned a "small fraction" of its users of a June 6 breach that likely exposed hashed passwords. Whether the incident is related to a LinkedIn breach has not been confirmed.
With an increase in state-sponsored hacking, Google says it will alert a select subset of its Gmail e-mail users when it believes their accounts may have been targeted.
LinkedIn has confirmed that a breach of its network compromised hashed passwords associated with accounts. Security experts speculate that e-mail addresses also could be vulnerable.
An unnamed hacker claims to have cracked Mitt Romney's personal Hotmail account, by correctly answering the security question: "What is your favorite pet?"
The time to select a breach resolution vendor is before you need one, stresses security specialist Robert Peterson. So what questions should organizations ask when choosing a vendor?
Why are breaches in the payments arena so difficult to trace and investigate? Verizon breach investigator Dave Ostertag offers insights about the forensics complexities of a processor breach.
An attack on the Thrift Savings Plan exposed personal details about more than 120,000 federal pension participants. Learn why one expert says the breach could have serious long-term implications.
Israel is being blamed - or, perhaps, taking credit - for the creation of Flame, the sophisticated cyberspyware that has targeted organizations in the Middle East, especially its mortal enemy, the government of Iran.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.