Leading the latest edition of the ISMG Security Report: Years of massive data breaches have fueled an increase in synthetic identity fraud, in which fraudsters combine real and bogus details to create more effective fake identities. Plus, has "The Dark Overlord" hacking group finally met its match?
The number of health data breach victims added to the official federal tally so far in 2018 has doubled in recent weeks to more than 2 million. The largest breach of the year so far involved a break-in at a California government office.
The noose appears to be tightening around the Dark Overlord, a group of international hackers who have stolen and held for ransom sensitive information from dozens of companies, healthcare organizations and U.S. public schools. Serbian police say they've arrested a suspect in cooperation with the FBI and U.K....
With the rise of P2P payment networks and the U.S. working toward a real-time national payments network, the push is on to battle fraudsters. Also, attackers are hacking legitimate websites to more stealthily distribute "Gandcrab" crypto-locking ransomware.
One of the biggest challenges in stopping data breaches lies in sifting through vast amounts of data to find the proverbial "needle in the haystack" - the subtle clues that indicate an attack is imminent or underway in your public agency or government organization. As modern computer systems generate billions of...
Building your organization's cybersecurity maturity doesn't happen overnight. It takes time and thought to adequately assess all the factors that go into creating and implementing an effective security strategy, particularly what steps to take after you've made an initial investment in security.
This whitepaper...
Ransomware is a multi-billion dollar business with the number of new ransomware variants continuing to grow quarter-over-quarter.
Download this report to learn more about:
What the scope and cost of an attack is in various industries;
How organizations are protecting themselves in various industries from...
Brett Johnson stole millions in a fraud career that made him one of the FBI's most wanted criminals. But now he's sharing his secrets to help organizations fight fraud. Why the change of heart?
We all know about May 25 and the enforcement deadline for Europe's General Data Protection Regulation. But what impact will GDPR have on cybersecurity programs? Danny Rogers of Terbium Labs weighs in on the topic.
Leading the latest edition of the ISMG Security Report: Cambridge Analytica shuts down, saying it's lost all of its customers, and Australia's Commonwealth Bank spots a big, bad potential data breach.
Industrial control system environments are tough to hack, because each is unique, says Sergio Caltagirone of Dragos. But the recent emergency of Triton malware shows that attackers have been testing how to compromise some environments, which could have catastrophic results.
Hacking is a global phenomenon, says Liv Rowley, an intelligence analyst at Flashpoint who's been tracking the rise, fall and mysterious reappearance of Cebolla Chan 3.0, the Latin American region's top Spanish language hacking forum.
British teenager Kane Gamble has been sentenced to serve two years in a youth detention center after he admitted to targeting U.S. officials - including hacking former CIA Director John Brennan's personal AOL email account - as well as dumping personal details for 20,000 FBI employees.
Incident response is a critical pillar of an effective endpoint security program, one that will gain importance as GDPR enforcement comes into play on May 25. Organizations must be ready to react if and when an incident occurs in order to meet the stringent requirements that apply during an incident.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.