eBay is urging its 145 million customers to change their passwords following a cyber-attack on a company database that compromised encrypted passwords and other personal information. Learn how and when the attack originated.
The arrests of more than 90 individuals for their alleged involvement in the use of BlackShades malware is a sign of progress in the global fight against cybercrime, but some experts question whether the crackdown will serve as a fraud deterrent.
There are a number of reasons why the U.S. government indicted five Chinese army officers for hacking American corporate computers to steal intellectual property. Bringing the assailants to justice isn't one of them.
Five Chinese military officers have been indicted for hacking U.S. companies - incidents that had major consequences, including the shuttering of three American steel plants, according to U.S. Justice Department officials.
A group of noted cryptographers, academics and business leaders will provide an independent assessment of the way the National Institute of Standards and Technology develops cryptographic standards and guidelines.
Class action lawsuits that banking institutions filed against Target Corp. in the wake of the retailer's massive breach are being consolidated. The suits seek recovery of expenses, such as the cost of re-issuing affected payment cards.
In this week's breach roundup, read about the latest incidents, including an update from Bitly regarding the security measures it has taken following a data breach, including implementing two-factor authentication.
Organizations looking to build a better breach response strategy need to emphasize the basics, including ensuring they have a well-qualified response team in place, security experts, including attorney Ron Raether, advise.
In the wake of large-scale breaches against retailers, including Target, the Retail Industry Leaders Association has launched an information sharing center in an effort to strengthen defenses against cyber-attacks.
Internet users in the European Union can ask Google and other search engines to remove certain sensitive information from Internet search results, Europe's highest court ruled on May 13. ENISA praised the "landmark decision" on privacy.
The UK Information Commissioner's Office says that neglecting to keep software security up to date and failing to encrypt online communications are among the top cybersecurity vulnerabilities at government and private-sector organizations.
To address new features and new threats, the National Institute of Standards and Technology has revised its guidance for transport layer protocol. Learn about the recommendations for protecting data during transmission.