The Federal Bureau of Investigation warns of a scheme involving pop-up windows through which fraudsters trick travelers into installing bogus software updates. The "updates" are really malware installations.
The hacktivist group Anonymous says it has stolen 1.76 GB of data from a United States Bureau of Justice Statistics server and posted it online for download. What's the rationale behind this latest attack?
A U.S. District Court has sentenced the last key figure from 2009's Operation Phish Phry, a two-year international cybercrime investigation that resulted in the arrest of 100 fraudsters on two continents.
New alerts from Visa and MasterCard suggest the breach at Global Payments dates to January 2011, an exposure window significantly longer than originally reported. What are the implications for card issuers?
In this week's breach roundup, read about the latest incidents, including a California home care breach affecting 700,000 and malware that exposed payment card details for customers of an online retailer.
News spread May 9 that information about more than 55,000 Twitter accounts had been leaked. But in a May 10 statement, the company said it was not breached, and the source of the leaked information remains unclear.
In this week's breach roundup, read about the latest incidents, including a Florida sheriff's office being hacked and a Houston hospital breach that may have led to the filing of fraudulent federal income tax returns.
Post-breach, organizations must have a full grasp on what happened - and convey that message consistently. Too often, that's not the case, says attorney Ronald Raether. What steps must organizations take?
Even with security information and event management systems, organizations labor to separate normal log data from actionable events, according to the latest Log and Event Management Survey from the SANS Institute.