The certificate authority system is flawed. It's like the Wild West, disjointed and unregulated, where no enforcement exists for standardized accountability.
Hacks are unavoidable; they happen. The challenge is how to handle them once they occur. DigiNotar demonstrates what organizations should not do when a breach is discovered.
"Forensics in the cloud is not necessarily a new field, but requires a new skill set and being able to learn on the fly," says Rob Lee, curriculum lead for digital forensics at SANS Institute.
Fraud is winning in the fight against cybercrime. Why? Because financial institutions continue to rely on ineffective technology and controls, says fraud analyst Tom Wills says.
A look at the health information breach statistics and the lessons learned - including the value of encryption - two years after the HITECH Act breach notification rule took effect.
As smartphone usage grows, so do emerging threats of mobile malware. When it comes to mobile banking security, financial institutions can only do so much. Security solutions will have to come from mobile vendors, says ENISA's Giles Hogben.
News about recent healthcare information breaches offers an important reminder: Monitoring the privacy and security procedures of your business associates should be a vital component of any breach prevention strategy.
Breach notification laws in most states would be preempted if a bill approved by the Senate Judiciary Committee becomes law. But that's a big if because of GOP objections, such as those voiced by the panel's ranking member, Charles Grassley.
Known as "recursion" among his LulzSec compatriots, Cody Kretsinger is among the hacking group's members responsible for the breach of Sony Pictures Entertainment computers between May 27 and June 2, according to federal authorities.
The breach earlier this month of certificate authority DigiNotar could prove to be the worst security event ever to happen on the Internet because it threatens, at its core, a fundamental principle of Internet transactions - economic and social - trust.
A breach involving the theft of an unencrypted hard drive from a car has affected more than 82,000 patients treated at healthcare systems in New Jersey and Illinois.
The Dutch company that was deceived by hackers into issuing fraudulent digital certificates is liquidating its assets under the protection of a bankruptcy court in the Netherlands after failing to recover from the attack.
"Once you identify that person based on the unique characteristics of their face, you could then match it with other databases," privacy advocate Beth Givens says, referring to privacy gaps created by facial recognition technology.
Indiana University School of Medicine is reminding faculty, staff and residents about the importance of encryption and other information security steps after the theft of an unencrypted laptop.
Stanford Hospital & Clinics reports that a business associate's subcontractor caused a health information breach when information about 20,000 patients treated in the hospital's emergency department was posted on a website.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.