An ongoing legal dispute between the Texas Health and Human Services Commission and its former contractor, Xerox, has led the state agency to report a breach it claims affected 2 million individuals. Learn what both sides have to say about the case.
A Russian website is streaming live footage accessed without authorization from cameras around the world. The exposure highlights the dangers of weak passwords and the need for organizations to vet the security settings of all Internet-connected devices.
European police have announced the arrests of 15 alleged users of remote-access Trojans, which can be employed by attackers to spy on webcams, launch DDoS attacks, steal financial details and launch extortion campaigns.
Retailers cannot avoid innovation. Yet, cybercriminals thrive when retailers innovate. What, then, can retailers do to stop cybercriminals from breaching their defenses? Here are three key questions to answer.
The director of the National Security Agency, Navy Admiral Michael Rogers, says he expects to see adversaries launch a cyber-attack in the next few years aimed at severely damaging America's critical infrastructure.
Cybersecurity specialists need to learn to think like an adversary in order to develop sound defense strategies, says Greg Shannon, chief scientist at the CERT Division of Carnegie Mellon University's Software Engineering Institute.
Testifying at a House hearing, a U.S. Postal Service official defended the delay in notifying USPS workers of a breach that exposed Social Security numbers, contending authorities initially didn't know what data was pilfered.
Microsoft has issued an emergency fix for a vulnerability in Windows Kerberos that is being exploited via in-the-wild attacks. Attackers can leverage the flaw to gain all-access rights to anything inside an Active Directory Domain, experts warn.
Legal experts size up class action lawsuits filed in the wake of two breaches, one affecting customers of the Jimmy John's restaurant chain and the other affecting employees and contractors of Coca-Cola.
Foreign spy agencies have powerful incentives to hack U.S. government IT systems, and that won't change, experts say, as they react to suspected Chinese involvement in the breach of National Oceanic and Atmospheric Administration websites.
Organizations in all business sectors should take a series of steps to guard against "visual hacking," a low-tech method used to capture sensitive, confidential and private information for unauthorized use.