When you have a smartphone or mobile device, the world is at your fingertips. Every day, there are new possibilities for mobile entertainment, shopping, banking, connecting socially and getting work done. But the speed at which mobile technology is changing has created dangerous gaps in security, and cybercriminals...
In the last year, some of the world's most prominent retailers have suffered the most devastating data security failures ever. The fallout from these episodes has been enormously damaging, both in direct financial costs as well as in terms of customer trust and goodwill: one major retailer hit by an attack saw a 46%...
Organizations are under increasing pressure to prevent security breaches by sophisticated teams that seek to steal sensitive data or other proprietary information - attacks that potentially put the organization, its employees or its customers at great risk. These targeted attacks are designed by skilled, innovative...
The ubiquitous connectivity of the "things" that enrich our lives, from thermostats to automobiles to medical devices, means software development is happening adjacent to cutting-edge technology developed by hardware manufacturers. The security industry can help guide the development of security practices for embedded...
The U.S. Justice Department has charged three men - two are in custody - for hacks against email service providers - including Epsilon - that allegedly resulted in the theft of 1 billion email addresses, many later used in massive spam campaigns.
All too often, an enterprise invests in security technology and services thinking that they'll be protected from a cyber attack only to discover that they are breached anyway. It prompts some sober reflection and a reassessment of their whole approach to security.
Businesses undertake a security program assessment...
Mandarin Oriental Hotel Group and Natural Grocers are two of the latest merchants to confirm breaches of their point-of-sale systems. Security experts analyze the impact these breaches are likely to have on issuers and cardholders.
British police over the course of this week launched 25 cybercrime-targeting raids and made 57 arrests, including suspects who have been tied to a U.S. Defense Department network intrusion, Lizard Squad attacks, as well as a massive Yahoo breach.
Attacks are larger, adversaries more diverse, and damage is broader. These are characteristics of today's DDoS attacks, and organizations need a new approach to protection, says Verisign's Ramakant Pandrangi.
Weaponized roller coasters? Kidnappers hacking babycams? Forget over-the-top "CSI: Cyber" hacking plots. The hackers behind the Rogers ISP breach, in their quest for bitcoins, claim they wielded nothing more serious than a telephone call.
The CEO of Bit9 speaks from experience: His firm was hacked, sensitive data stolen and customers put at risk. And what's happened since represents his mission to fend off attackers, even as they refine their hacks.
Today's cyber world is an evolving landscape of known vulnerabilities and exploits coupled with new threats brought by new technologies. Security professionals must learn to protect their businesses from both.
The HP Cyber Risk Report 2015 brings the information you need to do that. This comprehensive study...
The headlines show us any business can become a victim of cyber crime. To fight back, we need to understand the vulnerabilities that exist in IT infrastructure and applications and how hackers exploit them to penetrate defenses and steal data.
The HP Cyber Risk Report 2015 provides a broad overview of the threat...
Canadian Internet service provider Rogers Communications has confirmed that information about the company and its customers was leaked after attackers successfully targeted one of its employees via a social engineering attack.
A new report details new clues suggesting that the massive data breach involving health insurer Anthem was launched by Chinese hackers. But will such evidence help businesses blunt future APT attacks?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.