Newly discovered breaches at E*Trade Financial and Dow Jones highlight hackers' increasing attempts to steal, sell and utilize personal information. Security experts describe PII's value for fraudsters and scammers and offer lessons learned from these and other incidents.
Financial services firm E*Trade and publisher Dow Jones are separately warning their customers and subscribers that their personal information - and in some cases, payment card data - may have been compromised in a cyberattack campaign.
How will China's arrest of hackers who pilfered American trade secrets affect U.S.-China cybersecurity relations? Experts offer an analysis of the implications.
Three U.S. senators are demanding answers from Experian after it suffered a breach that exposed personal information for 15 million T-Mobile subscribers. They also have called for national breach notification and data security regulations.
Traditional signature-based endpoint protection solutions struggle to protect against today's advanced threats and zero-day attacks. Enterprises need to detect and respond based on real-time monitoring and a continuous recorded history to reduce the attack surface with multiple forms of prevention.
Download this...
Cybercriminals have both the bandwidth, technical skills, and purpose to focus on stealing your organization's sensitive data and they are targeting your endpoints and servers.
This eGuide outlines the strategies and tactics cybercriminals are using to target end user devices and provide tips on what your...
In the past, hackers used to break into a system to steal as much data as possible and get out without worrying about detection. Today, however, they have learned to be patient, harvest more data, and cause significant security and financial effects. Because of this, organizations must detect and respond to incidents...
As a result of Experian's data breach, 15 million T-Mobile subscribers are at risk from phishing attacks and fraud. But it's not clear what more T-Mobile can do to protect breach victims, says security specialist Mark James.
Mobile banking is growing out of its infancy and experts predict it will soon be the dominant banking and payments channel. However, with mobile operating systems and their varying support of security best practices, multiple new threat vectors are being introduced and many are already being widely utilized for...
Discount brokerage firm Scottrade says hackers accessed its computer network and stole names and street addresses of millions of its clients. The firm says it learned of the intrusion from law enforcement officials.
Credit-rating provider Experian says a hack attack compromised a server storing sensitive personal information on millions of T-Mobile customers, including those requiring credit checks for service or device financing.
Even if China fails to live up to its promise to stop pilfering corporate trade secrets, as America's spy chief predicts, the U.S. could still benefit diplomatically from the two nations' cybersecurity agreement.
The commoditization of attack infrastructure and services in the cyber-criminal underground, and the low cost and ease of launching targeted attacks, are growing concerns that require new defense strategies, says Trend Micro's Raimund Genes.
The hotel chain bearing 2016 U.S. presidential candidate Donald Trump's name has confirmed that its point-of-sale systems were malware-infected for more than a year, but it's downplaying the possibility that card data was exfiltrated or used to commit fraud.
The severity of the U.S. Office of Personnel Management breach continues to grow, with investigators now reporting that hackers stolen 5.6 million people's fingerprint data. The theft may have security implications well into the future.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.