After Kansas Heart Hospital suffered a ransomware infection and paid the demanded ransom, its attackers demanded more. At that point, the hospital reportedly declined to comply, relying instead on its pre-prepared backup and recovery plan.
Too few organizations have in-house incident response teams. As a result, they lack the native ability to even detect evolving threats, such as ransomware, says Ann Barron-DiCamillo of Strategic Cyber Ventures in this video interview. What are the must-have response capabilities?
Officials in several nations are probing the security of the SWIFT interbank messaging system in the wake of recent hacker attacks. Can the bank-owned cooperative better police members, secure access to its network as well as spot emerging hack attacks and fraud?
Another series of SWIFT-enabled hack attacks against a bank has come to light, following the theft of $81 million from the central bank of Bangladesh and SWIFT warning that other banks are also being targeted.
Today's threat actors are more focused, funded and disruptive than ever. But the cybersecurity defense industry is not built to respond appropriately, thought leader Tom Kellermann of Strategic Cyber Ventures says in this video interview. What are security leaders overlooking?
Banks and regulators have begun reviewing SWIFT-related information security practices and requirements following the online heist of $81 million from Bangladesh Bank. Authorities say much of that money is still missing.
In a shocking twist, the developers behind the TelsaCrypt ransomware have apologized for their ransom campaign and released a master decryption key, which all victims can now use to unlock the malware.
Mary Jo White, chair of the U.S. Securities and Exchange Commission, says cybersecurity is the biggest risk facing the financial system. Financial institutions need to do more to build data security policies tailored to their risks, she stresses.
A data breach notification service bought what appear to be 117 million username and poorly hashed passwords obtained via the 2012 breach of LinkedIn. That's a far cry from the 6.5 million stolen passwords that initially came to light.
A judge has declined to share details of a flaw exploited by the FBI - either in the Firefox browser or modified Tor version - during the course of a large child pornography investigation, saying Mozilla should deal directly with the U.S. government.
The U.S. Supreme Court this week sided with data aggregator Spokeo in a case dealing with when consumers can sue for privacy violations. The high court remanded the case to the Ninth Circuit Court of Appeals to examine the issue of whether the plaintiff was harmed when Spokeo published incorrect information about him.
A criminal case against an engineer who allegedly stole trade secrets while he worked at two medical device companies highlights yet again the need to prioritize the protection of intellectual property. The indictment comes just weeks after Epic Systems was awarded $940 million in another trade secrets theft case.
Tavis Ormandy of Google's Project Zero found he could hack Symantec's security products with a single email. The flaw has been fixed, but the finding is a reminder that flaws in anti-virus software can leave users at serious risk from hackers.
Hacker attacks in the healthcare sector so far this year generally have targeted smaller organizations and affected fewer individuals, in contrast with last year's massive hacker incidents. For example, one of the latest victims is a small physician group practice in Texas.
Apple has removed from its App Store a $0.99 security tool developed by well-known researcher Stefan Esser that he says could quickly detect if an iPhone may have been hacked. What is the back-story behind this move?