As the Senate continues to wrestle with the Cybersecurity Information Sharing Act of 2015, with a vote expected next week, opposition to the bill from some privacy groups and major technology firms, including Apple, is heating up.
European criminals combined cannibalized EMV chips from stolen cards with miniature microprocessors to build fake payment cards that defeated POS security checks, enabling them to steal as much as $680,000, French researchers say.
The size of the information security analyst workforce in the United States rose by nearly 20 percent in the past year, according to an Information Security Media Group analysis of U.S. Bureau of Labor Statistics data.
Attributing cybercrime to specific criminals is becoming increasingly critical, says Eward Driehuis of threat intelligence firm Fox-IT. Using the elusive Dridex campaign as an example, Driehuis explains in this video interview how many malware attacks are interconnected.
Apple has removed hundreds of apps from its App Store for violating its user-tracking guidelines. Chinese mobile advertising firm Youmi has issued "sincere apologies" for the tracking behavior and promised to compensate affected developers.
The FBI and Secret Service are investigating reports that CIA Director John Brennan's personal AOL email account was hacked by an American teenager, who found and leaked sensitive information on top U.S. intelligence and national security officials.
A number of short-term and long-term hurdles, including technology and policy issues, stand in the way of achieving secure, interoperable, nationwide health information exchange, says David Kibbe, M.D., of DirectTrust, which maintains a secure email framework.
Dow Jones has dismissed a competitor's report, which claims that attackers operating from Russia hacked into the company's servers and stole sensitive financial information for insider-trading purposes.
A podiatrist, his wife and the CEO of a healthcare firm have been indicted in a Medicare fraud case that allegedly involved an electronic medical records system deliberately configured to submit falsified medical claims.
Fraudsters break into your network by phishing for access in increasingly sophisticated ways. Anthony Giandomenico of Fortinet describes the importance of tracing every step in the attack lifecycle when devising an effective security strategy.
How do you effectively secure healthcare networks when so many devices access them? Deena Thomchick of Fortinet discusses the unique challenges faced by healthcare leaders required to guard against incursion, both by outside hackers and insiders.
In an exclusive interview, Harris Health System CISO Jeffrey Vinson explains how his team is spearheading an effort to help the federal government and the healthcare industry improve cyber threat intelligence sharing.
Unprecedented levels of collaboration among targeted financial services firms enabled the international law enforcement operation that disrupted the Dridex botnet, security firm Fox-IT says. Now, can that model be repeated going forward?