When a database breach occurs, consumer notification continues to be a public problem, and it's time for the federal government to step in, says Linda Foley, co-founder of the non-profit Identity Theft Resource Center.
Incoming House Speaker John Boehner taps William McClellan "Mac" Thornberry, R-Texas, to coordinate a way to more efficiently address cybersecurity legislation in a Congress where nearly every committee has some sway.
The Avalanche crime group, the world's most prolific phishing gang, has moved from using conventional phishing to solely propagating Zeus, the most famous and stealthy password-stealing malware, say security researchers in a new report.
Good start, but we've still got a long way to go. This statement sums up industry experts' reactions to the two cyber fraud advisories issued this week to help organizations prevent ACH fraud and other crimes.
Two weeks after authorities on two continents arrested cyber criminals linked to the Zeus malware, Microsoft has added the infamous Trojan's signature to one of its best removal tools in an effort to hunt down infected machines.