Penn State University's College of Engineering computer network has been victimized by two sophisticated cyberattacks, with at least one originating from China.
The British government rewrote the country's computer abuse law in March to shield law enforcement and intelligence agencies from being prosecuted for hacking. The move, which just came to light, appears to have been driven by a legal claim.
Caffeine junkies are up in arms over reports that criminals have been targeting their Starbucks account balances. But the real story is poor password-picking practices by consumers, and Starbucks' lack of multi-factor authentication.
The public demands accountability for data breaches involving systems that include personally identifiable information (PII) and expects that all educational institutions will have the same levels of security that Fortune 500 companies do. However, most educational institutions have fewer IT security resources than...
The public demands accountability for data breaches involving government systems and expects that all government entities have the same levels of security that Fortune 500 companies do. However, most government organizations have fewer IT security resources than their larger enterprise counterparts, yet they face the...
The public demands accountability for data breaches involving private healthcare information and expects that all healthcare institutions will have the same levels of security that Fortune 500 companies do. However, most healthcare organizations have fewer IT security resources than their enterprise counterparts, yet...
To battle nation-state cyberthreats, the U.S. must work with its allies to develop norms of behavior in cyberspace that could then be adopted by other nations, experts said at a Senate hearing.
Patching is among the primary challenges facing enterprises in their adoption of IoT devices. Fortinet's Darren Turnbull shares insight on how to anticipate and respond to the top security obstacles.
For banks with strong mobile offerings, the huge demand for mobile RDC services is a major opportunity to win new customers. However, the increased usage of mobile
RDC services can also increase fraud risks. Specifically, fraud-related remote deposit losses, which were previously only seen in the commercial sector,...
Fraudsters have been hacking into and draining Starbucks accounts, customers report. Security experts say attackers appear to be guessing weak account passwords, then using funds to fill up gift cards destined for the black market.
What are the biggest cyberthreats facing healthcare entities today and on the horizon? What steps are healthcare organizations taking to prevent and detect breaches? And what are the top data security priorities for the year ahead?
For answers to these questions and many more, check out the Healthcare Information...
Much of today's crime is "cyber-enabled," warns cybercrime expert Raj Samani, and successfully blocking such attacks increasingly demands not just better technology and public-private collaboration, but also an understanding of psychology.
The Internet was a 20th century blessing, and one which continues to provide transformational benefits in the 21st century. The Internet is no less significant in transforming the world economy than the sextant or steam engine. However, the benefit of the Internet has brought with it a dark side; a side that is...
A judge's decision to allow MasterCard's settlement with Target to stand isn't likely to be appealed and could discourage banking institutions, some experts say, from continuing to pursue a breach-related class-action lawsuit they filed against the retailer.
Learn how to stop fraudsters from wreaking havoc with your online assets
User Behavior Analytics (UBA) is the future of fraud prevention. Once only valued by early adopters, UBA has entered the mainstream as some of the largest companies in the world use this technology to secure their websites from bad user...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.