Big-box retailer Target has confirmed that a breach that likely exposed some 40 million U.S. debit and credit accounts was caused by a malware attack that infected its point-of-sale system. Find out all the latest details.
On Christmas Eve, Target issued a warning about phishing scams linked to its breach recovery efforts. In response, the retailer says it is launching a dedicated resource page on its website for official communications.
Version 3.0 of the PCI Data Security Standard goes into effect Jan. 1, 2014. What steps should organizations be taking to prepare for implementation of the standard? Troy Leach and Bob Russo of the PCI Security Standards Council explain.
Was it a point-of-sale attack? A network breach? Or was it an inside job? Fraud experts disagree over the cause of the Target data breach, but they are united in how banking institutions should respond.
President Obama defends the National Security Agency's bulk-collection initiative, but suggests he may adopt some of the recommendations presented by a panel that proposes changes in the NSA's surveillance program.
In this week's breach roundup, read about the latest incidents, including the sentencing of a hacker who modified his medical college entrance exam grades and a breach affecting Colorado state employees.
An independent presidential panel makes recommendations to limit the National Security Agency's surveillance methods, including curtailing the way the government systematically collects and stores metadata from Americans' phone calls.
Karen DeSalvo, M.D., health commissioner of New Orleans, will be the next national coordinator for health IT. What privacy and security issues will she face as leader of the office that crafts guidelines for the HITECH Act's EHR incentive program?
Cottage Health System in California says patient information was apparently exposed on Google for 14 months because of a lapse in a business associate's protections for one of its servers. Experts discuss the implications for the BA.
Healthcare organizations subject to an HHS fraud or breach investigation need to ensure they're prepared and can respond in a timely manner when investigators visit on-site, says former federal investigator Stephen Morreale.
Jeh Johnson, the new secretary of Homeland Security, is expected to become one of the top advocates of the administration's cybersecurity policy as the White House shifts more IT security responsibilities to DHS.
President Obama met with technology company executives critical of his administration's surveillance program a day after a federal judge ruled that portions of the National Security Agency program could be unconstitutional.