The apparent breach of a system support portal used by Oracle MICROS to remotely access and service MICROS point-of-sale systems has raised more questions than answers. What actually happened? Which data was compromised? And who waged the attack?
Unlike other malware, ransomware practically screams and shouts at victims, and that distinct behavior holds promise for helping to better detect and block ransomware infections, according to Northeastern University security researchers.
A very advanced and targeted cyber-espionage campaign has been active for five years, and employs stealthy malware that can penetrate air-gapped networks and exfiltrate data using multiple techniques, security researchers warn.
A report on FBI Director James Comey seeking to reopen the debate over creating for law enforcement a bypass to encryption on mobile devices is among the stories featured in the latest ISMG Security Report.
Delta is warning that a power failure lead to system outages, resulting in numerous flight cancellations or delays. As more airline-related processes get computerized, experts are asking why the airline's systems aren't more resilient.
Ransomware gangs are employing "customer service" agents to field victims' queries in an attempt to maximize their illicit profits, according to security firm F-Secure, which describes the encounters of someone posing as a victim.
Scuffles between anti-virus software vendors have stepped up a notch, with startups and industry stalwarts slinging mud at each other. Cylance now says it plans to make its product available for tests used to benchmark security software.
The new "No More Ransom" portal is designed to emphasize that police and security firms are doing whatever they can to disrupt ransomware gangs, as well as to help more victims get their data back for free, says Intel Security's Raj Samani.
CEO fraud campaigns are becoming far more common. A recent attack against our company was deflected because of the alertness of a staff member who received a fraudulent wire transfer request, illustrating why well-informed employees truly are the best lines of defense against these schemes.
CISOs must be empowered to define the security architecture for smart cities. How? By securing endpoints of known and unknown device categories in the network, says David Dufour, head of security architecture for smart cities at Webroot.
Security firm ThreatConnect says Guccifer 2.0, who claims to be the lone hacker of the Democratic National Committee, may have close ties to Russia. But after reviewing related technical evidence, not all security experts agree.
Fallout from the leaked Democratic National Committee emails continues, with a new finding that suggests cyberattackers compromised a staffer's personal email account. The FBI also has confirmed its ongoing investigation into the breach.
As Democrats gather in Philadelphia to nominate Hillary Clinton for president, it's a good time to examine the former secretary of state's positions on cybersecurity and online privacy. Here's where she stands.
As the Pokémon Go craze continues to take off, it's clear that when it comes to chasing virtual creatures through real-world locations, too many people fail to keep some common sense guidelines in mind.