A security expert and average consumers respond differently to the eBay breach. As most customers retain a high degree of faith in online merchant security, the expert believes eBay committed a serious sin in its lack of strong authentication.
It's unlikely that the downing of a Malaysian airliner by an anti-aircraft missile over Ukraine and the air and land battles in Gaza could expand into a cyberwar. Here's why.
From Neiman Marcus to P.F. Chang's, 2014 has shaped up to be the 'Year of the Data Breach.' What lessons can be gleaned from the trenches of breach investigation? Experian's Michael Bruemmer shares tips.
The Obama administration urges Congress to update U.S. anti-hacking laws to crack down on fraudsters operating abroad, disrupt spam and DDoS botnets, and arrest "botnet for hire" service providers.
Canadian authorities are investigating whether a hacker or healthcare insider used a physician's credentials to gain unauthorized access to a British Columbia prescription information network, accessing information on 1,600 patients.
The National Institute of Standards and Technology should use the cryptographic community to help vet the advice it gets from the National Security Agency when creating cryptography guidance, a panel of prominent experts recommends.
Orangeburg-Calhoun Technical College in South Carolina is notifying 20,000 former and current students and faculty members that an unencrypted laptop computer stolen this month contained their personal information.
One month after an international law enforcement effort targeted the Gameover Zeus banking Trojan, new versions of the malware are being distributed via spam campaigns.
Leading this week's industry news roundup, Splunk releases an app for iPhone and iPad, while Brainloop partners with Microsoft to develop an application for Windows 8.1.
Microsoft absolves dynamic DNS provider No-IP of being complicit in a malware campaign that infected millions of PCs and apologies to the 1.8 million customers who experienced outages.
With the Senate Intelligence Committee overwhelmingly approving the Cybersecurity Information Security Management Act, common wisdom dictates the bill will head directly to the Senate floor. Not so fast.
Is having too many stakeholders who care about cyberspace's viability a hindrance to security? That's one way to interpret comments from White House Cybersecurity Coordinator Michael Daniel as he addresses the challenges of governing the Internet.
Characterizing the state of employment among American information security practitioners, executive recruiter Joyce Brocaglia says, "We are experiencing negative unemployment in the field of information security."
Oracle has stopped supporting XP, but promises the next update for Java 7 -- though not Java 8 -- will still run on XP. But for how long will this continue? Security experts chart XP's "downward spiral."
While HHS is making strides in its battle against fraud, some of the fraud-busting recommendations from the watchdog agencies are the same suggestions that GAO and OIG have been making for years.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.