The security firm defends service, says it offers a free consumer check against more than 1.2 billion credentials stolen from over 420,000 web and FTP sites, and hashes all checked passwords to keep them secure.
European officials plan to continue pushing for stronger EU privacy rules in the wake of a controversial U.S. court ruling that authorizes the U.S. Justice Department to seize data stored outside the country.
With lessons learned from the misfired launch of HealthCare.gov, the Obama administration is offering expert help - including security and privacy tips - to other federal agencies for their IT rollouts.
Identity fraud is one of consumers' most feared crimes, and at banks those schemes translate into application fraud. FICO's Adam Davies discusses today's common application fraud scams and how to stop them.
Detecting and preventing advanced attacks isn't just a technology issue - it's a business risk that needs to be elevated to the highest levels of an organization. Trend Micro's Tom Kellermann shares strategies.
Finding a common theme from the Black Hat USA conference isn't easy, but a few emerged - simplifying complexity and developing community-based solutions - from sessions and discussions with top cybersecurity experts.
Some leading U.S. healthcare CIOs and CISOs say they are ready to handle potential crisis situations, such as treating Ebola patients, by following well-established privacy and security best practices.
With the explosion of consumer fitness devices and health-related apps, Sen. Charles Schumer, D-N.Y. wants the Federal Trade Commission to push the vendors of those products to adopt new privacy safeguards.
Cyber-historian Jason Healey contends the U.S. government does not want peace in cyberspace so it can conduct more attacks and exploitations. Instead, he says the feds should make the Internet's economic benefits its top priority.
This week's top reported breach incidents, including the report by Hold Security warning that a Russian cyber gang had breached 1.2 billion passwords, all have one thing in common: They leave numerous questions unanswered.