Adultery site Ashley Madison fined $8.75M customer data hack
Adultery dating service submits to 20 years of federal auditing of its information security.
Adultery dating service submits to 20 years of federal auditing of its information security.
Cyber incidents dominated headlines this year, from Russia’s hacking of Democrat emails to internet cameras and DVRs launching DDoS attacks, leaving the impression among many that nothing should be entrusted to the internet.
As some of the tech sector’s heaviest hitters prep for a meeting this week with president-elect Donald Trump, they need to make sure they get answers to critical questions about issues that could affect not only their businesses but the U.S. economy in general.
Donald Trump’s effect on cybersecurity after he’s sworn in as president will likely be toward military uses of cyber weapons and stronger tools for law enforcement to crack encryption, but the impact is hard to predict due to the vagueness of his proposals so far.
12 cyber shopping tips because criminals will be using all the attacks they can this holiday season in order to score cash and gather valuable personal data that they can monetize later.
Hackers are writing apps, setting up phony Wi-Fi networks and unleashing malware in attempts to turn legitimate Black Friday and Cyber Monday retailing into profits for themselves, according to security experts.
Attackers who were trying to turn the Ask.com Toolbar into a malware dispensary got caught early on when their scheme was picked up by security services that were looking for anomalies.
IBM Security has launched a network-emulation environment where corporate teams can play out attack scenarios so they are better prepared for incidents they might face in the real world.
The annual holiday uptick in denial of service attacks will likely continue this year only this time with a new devastating weapon: Internet of Things (IoT) devices, according to Akamai.
Filling cybersecurity jobs is getting so hard managers need to think outside the box if they hope to fill critical positions.
The Internet of things (IoT) has already been used to launch the biggest DDoS attacks ever, but now it represents a potential path for attackers to compromise cell phones.
ExtraHop is introducing a way to capture files just before ransomware encrypts them, making it possible to restore them but without regularly scheduled comprehensive updates.
Cisco has announced security upgrades to cut the time compromises go unnoticed on endpoints, giving attackers less time to do damage if they get past preventive security measures.
The DDoS attacks that flooded Dyn and knocked high-profile Web sites offline don’t mean businesses should abandon DNS service providers, in fact they should use more than one DNS provider for redundancy.
IBM Security is introducing online banking protection that flags fraudulent account users based on how they move their mouse.