Stealth espionage malware known as 'Regin' or 'Regis' has been targeting government agencies, businesses and research institutes, with Russia and Saudi Arabia as prime targets, researchers say. But it's unclear what nation is behind the attacks.
Citadel financial malware has been upgraded to steal master passwords for software designed to securely store lists of usernames and passwords, according to IBM's Trusteer unit. Security experts offer insights on how to respond to the threat.
A Russian website is streaming live footage accessed without authorization from cameras around the world. The exposure highlights the dangers of weak passwords and the need for organizations to vet the security settings of all Internet-connected devices.
European police have announced the arrests of 15 alleged users of remote-access Trojans, which can be employed by attackers to spy on webcams, launch DDoS attacks, steal financial details and launch extortion campaigns.
The director of the National Security Agency, Navy Admiral Michael Rogers, says he expects to see adversaries launch a cyber-attack in the next few years aimed at severely damaging America's critical infrastructure.
Security experts warn of an increased risk that terrorists will disrupt the financial sector via cyber-attacks. In response, law enforcement authorities who monitor U.S. and U.K. financial markets plan to embed employees in each other's organizations.
Testifying at a House hearing, a U.S. Postal Service official defended the delay in notifying USPS workers of a breach that exposed Social Security numbers, contending authorities initially didn't know what data was pilfered.
Microsoft has issued an emergency fix for a vulnerability in Windows Kerberos that is being exploited via in-the-wild attacks. Attackers can leverage the flaw to gain all-access rights to anything inside an Active Directory Domain, experts warn.
Legal experts size up class action lawsuits filed in the wake of two breaches, one affecting customers of the Jimmy John's restaurant chain and the other affecting employees and contractors of Coca-Cola.
From PCs to tablets to smartphones, customers enter institutions from all electronic angles. And these new banking habits put new strains on traditional IT infrastructure. How can banks ensure security?