A confidential FBI "flash" alert is warning of "wiper" malware attacks - that delete hard drive content - against U.S. businesses. Security experts say the alert is tied to the hack of Sony Pictures Entertainment, which may be linked to North Korea.
Barring a catastrophic cyberattack in the next few days to motivate legislators to act, don't expect lawmakers to vote on any cybersecurity bill for the remainder of the current Congress.
A year after Facebook received a bug report regarding a loophole in its app architecture, the vulnerability remains exploitable, says the researcher who discovered this potential threat to user privacy.
Retailers say tokenization and encryption are critical to ensuring payment card data security. Aite's Natalie Reinelt describes how merchants will use layers of security to protect data at the point of capture.
Capturing the detailed actions of privileged users is even more critical in today's business environment. Security and compliance issues also exist with third-parties including Cloud Providers, Service Providers and ISVs. Also, every major compliance regulation requires organizations to document what users actually...
Security breaches are all over the news, many of them a result of either insider threats or advanced persistent threats.
Companies and government agencies are looking for solutions to mitigate the risks these threats present. This white paper details three common Windows Server threat scenarios and explains the...
Although much publicity around computer security points to hackers and other outside attacks, insider threats can be particularly insidious and dangerous, whether caused by malice or employee negligence.
Download this report to learn:
The eight most significant cybersecurity threats that could impact your...
A new U.K. government report accuses social networks of serving as a "safe haven for terrorists," inflaming what some see as tense relations in the post-Snowden era between the British government and Silicon Valley.
A massive international operation has resulted in the arrest of 118 people suspected of using stolen card data to buy airline tickets, or using fake tickets, thanks to big data capabilities for combating crime.
The Syrian Electronic Army hacker collective has claimed credit for hacking into an advertising network used by a number of media sites, as well as disrupting access to more than 80 websites.
Anti-virus firms Symantec, F-Secure, and Kaspersky Lab have been criticized for not issuing public alerts more quickly about powerful Regin espionage malware that has capabilities that reportedly rival Stuxnet and Flame.
Hewlett Foundation President Larry Kramer explains why the group is funding academic efforts to lay the cornerstone for sustainable public policy to deal with the growing cyberthreats faced by governments, businesses and individuals.
The use of big data for real-time threat analysis will become more commonplace among banks and credit unions in 2015, says Bill Stewart of Booz Allen Hamilton, who describes cybersecurity trends for the year ahead.
High-privilege access is one of the most sensitive aspects of IT. Administrative accounts have the ability to make sweeping and fundamental changes to IT systems on which the business may depend. When used in ways not intended, the impact of this capability can cause a wide spectrum of damage, from security threats...
On average, organizations take 229 days to detect a data breach, research shows. Experts offer insights on the key steps to take to speed up the detection of intrusions and minimize the damage.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.