Authorities say the suspect from suburban Philadelphia obtained users' credentials to the compromised computers and sold access to the breached computer networks, as well as other access credentials.
The initial 20 HIPAA compliance audits found that more organizations had trouble with security compliance than privacy compliance, an analysis by federal officials shows. Learn about the other findings.
"This is about preparing the battlefield for another type of covert action," a former high-ranking U.S. intelligence official says. "Cyber collection against the Iranian program is way further down the road than this."
LinkedIn's failure to comply with long standing industry standard encryption protocols jeopardized its users' PII, and diminished the value of the services, the class action federal lawsuit filed in northern California says.
"When students come out of this program they will be what industry will like them to be and much more than that ," says Dr. Michael Hicks, director for the Cybersecurity Center at the University of Maryland.
"This strategy is not simply about embracing the newest technology; it is about keeping the DoD workforce relevant in an era when information and cyberspace play a critical role in mission success," Defense Department CIO Teresa Takai says.
Final versions of several pending federal healthcare regulations that deal, in part, with privacy and security issues will be issued soon, federal authorities say. Find out all the details.
Memorial Sloan-Kettering Cancer Center in New York is notifying 880 patients that some of their personal information may have been exposed when it was inadvertently embedded in PowerPoint charts posted on two websites.
The ISO 22301 standard for business continuity has been issued. What do organizations need to consider as they implement the new standard? Lyndon Bird of the Business Continuity Institute offers insight.
Brokers and insurers have upped their marketing efforts to get enterprises to purchase cyber insurance, even though policies could be risky for sellers and buyers. See 10 considerations you should mull before buying cyber insurance.
"We require people with very strong, foundational grounding who can solve hard problems that are highly technical in nature," says Sujeet Shenoi, professor at the University of Tulsa in Oklahoma.
Schmidt, speaking at the Gartner Security Summit, reflected on his tenure as a special assistant to the president, including his role promoting an international cybersecurity strategy, online trusted identities initiative and IT security education.
Federal authorities have charged a Dutch hacker for the role he played in an elaborate scheme that targeted POS systems and networks to steal credit card details that were later sold on websites for fraudulent purposes.
When Joseph Bognanno of Wolters Kluwer Financial Services examines 2012's financial fraud trends, all he sees is more - more of everything, from schemes to new guidance. How can banks stay ahead?
A successful effort to build a corporate culture that values privacy should be built on ideas that come from the rank-and-file staff in all departments, says Jan Hillier, a specialist in managing change.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.