Banks struck by the wave of DDoS attacks are communicating badly and missing a great opportunity to educate their customers about cybersecurity, says Gregory Nowak of the Information Security Forum.
Apparent online outages at PNC, U.S. Bank and Wells Fargo are likely linked to suspected earlier attacks that hit Bank of America and Chase. What do these latest incidents mean for other institutions?
With so much hype and confusion around cybersecurity, falsely claiming an attack can have an impact on organizations trying to safeguard their digital assets.
Sen. Jay Rockefeller, in a letter to Fortune 500 company CEOs, queries them about their businesses' IT security practices and wonders if they agree with efforts by the U.S. Chamber of Commerce to block a vote on the Cybersecurity Act of 2012.
Financial institutions are now at high risk of cyberattack, according to the Financial Services Information Sharing and Analysis Center. What can institutions do to protect themselves from new threats?
Two Romanians pleaded guilty to breaching point-of-sale systems at Subway and other U.S. retailers. Experts say the breach exposes common security vulnerabilities that remain a concern.
The continuing loss of data to China suggests that the federal government should carefully assess the cybersecurity implications associated with the expansion of Chinese cloud and mobile providers in the U.S.
A federal agency is offering a free online training program that provides useful insights on protecting information privacy. Learn how this clever training "game" works.
A Twitter posting by an individual claiming to be from the hacktivist collective Anonymous claimed it targeted GoDaddy on Sept. 10, but it wasn't until the following day the company determined its computers were not breached.
An individual claiming to be part of Anonymous, the hacktivist group that has targeted big business and government, seems to have taken aim at small businesses by claiming to have disrupted website host GoDaddy.com.
Sen. Susan Collins, who, like President Obama, backs the Cybersecurity Act, cautions the president against issuing an executive order to protect the nation's critical IT, saying it would send an signal that congressional action isn't urgently needed.
You have one shot to get it right. How should organizations prepare properly for a data breach? Experian's Michael Bruemmer outlines four steps to help ensure a smart approach to breach preparation.
Owners of Apple iPad, iPhone and iPod Touch devices whose unique device identifiers might have been exposed in a breach would face little, if any, potential harm as a result.
Organizations must carefully consider patch management in the context of overall IT security because it's so important to achieving sound security. Read about NIST's recommendations on how best to implement patch management.
The Federal Bureau of Investigation denies that one of its agent's laptops was compromised by Anonymous-affiliated hacktivist group Antisec, which claims credit for such a breach. The group says the breach gave it access to 12 million Apple unique device identifier numbers.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.