A team of hackers has been operating since at least 2001, wielding malware that even today is among the most advanced attack code to have ever been discovered, according to a new study. Security experts are debating whether the NSA could be involved.
As cybercrime grows, Section 66A of India's IT Act is under scrutiny of the court, government and security leaders. Some experts say it requires amendments to ensure correct interpretation and implementation.
A key component of President Obama's executive order to encourage industry to share cyberthreat data is the creation of information sharing and analysis organizations, or ISAOs. But now, the hard part begins: defining the job and getting it done.
The Anunak/Carbanak gang continues to rob financial services firms and retailers, in part with ATM malware. A new report says the cybercrime gang has stolen up to $1 billion from banks in Russia, the U.S. and beyond.
The White House Summit on Cybersecurity and Consumer Protection late last week served as the stage for more than a dozen companies and trade groups to announce new initiatives aimed at securing Internet transactions and payments and reducing fraud.
In a Feb. 13 keynote speech at a cybersecurity summit, President Obama described the cyberworld as the "wild, wild West" and the American government as the sheriff. Then he signed an executive order aimed at boosting cyberthreat information sharing.
Experts agree that Section 66A of India's IT Act is not meant to violate anyone's right to free speech or lead to frivolous complaints based on annoyance. What's not clear is what kind of messages would be considered offensive, resulting in punishment.
Enterprise IT administrators are being urged to immediately patch a flaw that affects every Windows system released for the past 15 years. Attackers could remotely exploit the flaw to take control of a device and run any code of their choice.
In a landmark decision, a British tribunal ruled that a U.K. intelligence agency broke the law by secretly using surveillance data collected by the U.S. National Security Agency. The ruling could have U.K. and U.S. repercussions, privacy experts say.
Anthem believes that the breach that has exposed up to 80 million individuals' information possibly began after a handful of employees fell victim to a phishing attack. Other attackers appear to be using the breach as a lure for their own phishing campaigns.
As state insurance commissioners and attorneys general launch investigations into health insurer Anthem's data breach, a U.S. Senate committee is examining the healthcare industry's preparedness for mitigating cyberthreats.
As health insurer Anthem's breach investigation progresses, some news reports are already pointing the finger at Chinese hackers as the possible culprits. But in this early stage of the investigation, security experts urge skepticism about attribution.