The annual Amsterdam gathering of information security aficionados detailed the very latest hacking threats, including cybersecurity attacks via drone, sniffing data from fitness devices, and exploiting ATMs using Raspberry Pi computers.
Sophisticated threats require advanced threat protection. A threat-focused next-generation firewall must adhere to three strategic imperatives. Learn how these imperatives improve defense against advanced threats.
Security vendor Proofpoint warns that a "malvertising" campaign has been launching ransomware attacks against users of numerous high-profile websites, including search site Yahoo, dating site Match.com, and an AOL real estate site.
Apple CEO Tim Cook traveled to China in the wake of allegations that hackers are targeting Chinese iCloud users. The Chinese government has denied any involvement in the attacks, which can bypass the latest iPhone's stronger encryption.
Almost all versions of Windows are vulnerable to an OLE flaw that is being actively exploited in the wild. This is the second zero-day vulnerability tied to the so-called "Sandworm Team" of hackers, and no patch is yet available.
Security experts participating in an FDA workshop highlight the urgent need to immediately improve the cybersecurity of networked medical devices, which may be vulnerable to hacking that could potentially be life-threatening.
An FBI official on Oct. 20 said the hacks of JPMorgan Chase and other U.S. banks do not appear to have been in retribution for Western economic sanctions against Russia. But FBI investigators still have not determined who was behind the attacks.
An unsecure folder of patient data that was accessible via the Internet has resulted in a breach affecting more than 307,000 individuals. Some security experts say this kind of misstep is a relatively common among healthcare organizations.
Staples has confirmed that it's investigating a potential data breach after a report warned that elevated levels of payment card fraud had recently been tied to card numbers used by consumers who shopped at the office supply retailer.
Despite President Obama's urgent call to lawmakers to enact a national data breach notification law, such legislation will not likely be voted upon before the current Congress adjourns at year's end. Here's why.
In addition to adopting the right IT security standards to mitigate advance persistent threats, organizations need to pick the right people to carry out those standards, says Jon Long, a featured speaker at ISMG's Global APT Defense Summit on Oct. 22.
In the wake of recent payment card breaches, President Obama is taking steps to speed the adoption of EMV cards. He's also calling on Congress to enact a national data breach notification law and announcing a White House summit on consumer cybersecurity.
"Cybercrime as a service" and the globalization of attacks are two of the trends noted by cyber-intelligence firm Group-IB in its third annual High-Tech Crime Report. Group-IB's Alexander Tushkanov explains the lessons that can be learned.