The Latest News

  • Hackers Wield Extortion

    Schemes Center on Lab Test Results, Nuclear Power 'Secrets' Hackers Wield Extortion

    More hackers are holding data for ransom, demanding everything from bitcoins to the shutdown of nuclear reactors, under the threat of leaking sensitive information. But it's not clear how many such attacks generate revenue for attackers. Read more...

  • Google Leaked Whois Data

    282,000 Domain Admins at Risk from Fraudsters, Spammers Google Leaked Whois Data

    Google has warned Google Apps administrators that their private Whois contact information has been exposed. The leak affects more than 282,000 administrators, and places them at greater risk of ID theft and spam attacks, according to Cisco. Read more...

  • Surveillance Report Urges Transparency

    Calls for Rewriting UK Intelligence Law from Scratch Surveillance Report Urges Transparency

    Parliament's Intelligence and Security Committee has called for a reboot of the regulations that govern Britain's intelligence services, warning that the current approach "is unnecessarily complicated and - crucially - lacks transparency." Read more...

  • Apple, Microsoft Issue Freak Flaw Fixes

    Microsoft Also Provides Update for Failed 2010 Stuxnet Patch Apple, Microsoft Issue Freak Flaw Fixes

    Both Microsoft and Apple this week released patches to address the so-called "Freak" flaw in SSL/TLS. Microsoft also released a fix that addresses a failed 2010 patch for a vulnerability that was exploited by the Stuxnet malware. Read more...

  • Biggest-Ever Data Breach: 3 Charged

    1 Billion Email Addresses Allegedly Stolen Biggest-Ever Data Breach: 3 Charged
    Viet Quoc Nguyen (undated photographs). Source: Department of Justice

    The U.S. Justice Department has charged three men - two are in custody - for hacks against email service providers - including Epsilon - that allegedly resulted in the theft of 1 billion email addresses, many later used in massive spam campaigns. Read more...

  • Article

    Tech Start-Up Slack Technologies Hacked

    Company Rolls Out Two-Factor Authentication Post-Attack By Marianne Kolbasuk McGee
    Tech Start-Up Slack Technologies Hacked

    Slack Technologies, a tech start-up that offers a group chat tool, announces it's rolling out two-factor authentication after hackers breached a database of user profile information.

  • Blog

    Google's Psychological Patch Warfare

    'Project Zero' Rewrites Vulnerability Disclosure Norms By Mathew Schwartz
    Google's Psychological Patch Warfare

    Psychologically speaking, nothing beats the power of a well-timed deadline. And love it or hate it, Google's 90-day "Project Zero" deadline for fixing flaws - before they get publicly disclosed - has rewritten bug-patching rules.

  • Article

    Why POS Malware Still Works

    Security Experts: It's Too Easy To Infect Retail Systems By Mathew J. Schwartz
    Why POS Malware Still Works

    New, advanced point-of-sale malware dubbed "Poseidon" can exfiltrate card data directly from every infected device. And security experts warn that too many retailers fail to test POS devices and segment networks to mitigate all malware threats.

  • Article

    Free Defense for Alleged $18M Hacker?

    Prosecutors Say Russian Has Resources to Pay Attorneys By Mathew J. Schwartz
    Free Defense for Alleged $18M Hacker?

    U.S. prosecutors are asking a judge to rescind his decision to provide a free defense for a Russian citizen who faces 40 charges relating to the alleged theft and sale of at least 2 million credit card numbers.

  • Blog

    Was Register.com Breached?

    FBI Reportedly Probing Hack Attack By Mathew Schwartz
    Was Register.com Breached?

    Web.com won't confirm or deny that its Register.com subsidiary, which manages more than 2 million domain names, has been breached. But a news report claims the FBI is investigating a year-old intrusion.

More news...

Webinars

More webinars...

White Papers

  • Win the Race Against Time to Stay Ahead of Cybercriminals

    Of all the questions organizations face in protecting against cyber attacks, one may be paramount: How long does it take to thoroughly investigate a security incident? Ideally, the answer should be...

  • Data Capture and Network Forensics

    The ability to capture, consume and correlate multifaceted data from all over the enterprise is a growing need. No single data source or type can provide sufficient forensic capabilities to solve all...

More whitepapers...
ARTICLE Ransomware Attacks' New Focus: Businesses

Ransomware attacks are getting more agile, varied and widespread, and are increasingly taking aim...

Latest Tweets and Mentions

ARTICLE Ransomware Attacks' New Focus: Businesses

Ransomware attacks are getting more agile, varied and widespread, and are increasingly taking aim...

The ISMG Network