Community Health Systems, which operates 206 hospitals, says a network breach exposed 4.5 million patients' personal information. Forensics experts believe the attacker was an "advanced persistent threat group originating from China."
Nonstop data breach notifications take a psychological toll, driving executives and consumers alike to alter their behavior for the worse. Here are three ways for businesses to battle data breach fatigue.
In the latest move in the battle between LabMD and the Federal Trade Commission, the medical testing firm has asked an FTC judge to sanction FTC, including dismissing the data security case against the lab.
Cybersecurity experts raise doubts whether the National Security Agency has successfully deployed an automated hack-back system known as MonsterMind as revealed by former NSA contractor Edward Snowden.
As details about the data breach that struck supermarkets owned by Supervalu and Albertsons unfold, security experts say it's likely this latest attack is linked to other recent merchant breaches.
The killing of an unarmed teen by police in Ferguson, Mo., has Anonymous sympathizers disagreeing on Twitter when and how to expose the identity of the shooter.
Tennessee government employees are being warned about a data breach involving a subcontractor for the state's wellness vendor, Healthways, which resulted in the exposure of sensitive information.
The security firm defends service, says it offers a free consumer check against more than 1.2 billion credentials stolen from over 420,000 web and FTP sites, and hashes all checked passwords to keep them secure.
Detecting and preventing advanced attacks isn't just a technology issue - it's a business risk that needs to be elevated to the highest levels of an organization. Trend Micro's Tom Kellermann shares strategies.
No question, the information security community - and all of us at ISMG -- lost a friend with the untimely death of Terry Austin, CEO and President of Guardian Analytics.
Researcher Joxean Koret says he's cataloged local and remote vulnerabilities in 14 antivirus applications, many of which have since been patched. But shouldn't the vendors have spotted them first?
This week's top reported breach incidents, including the report by Hold Security warning that a Russian cyber gang had breached 1.2 billion passwords, all have one thing in common: They leave numerous questions unanswered.
IT security expert Bruce Schneier, now the chief technologist at an incident response provider, sees tools that help enterprises respond to a data breach being used for other unexpected events.
Learn the top techniques for defending against ransomware attacks that encrypt stored data and demand a payoff to unlock PCs, servers, storage devices and smart phones.
U.S. Investigations Services, which conducts background checks for the Department of Homeland Security and other agencies, says it has identified a cyber-attack on its corporate network; agencies have suspended use of the firm's services.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.