Discount brokerage firm Scottrade says hackers accessed its computer network and stole names and street addresses of millions of its clients. The firm says it learned of the intrusion from law enforcement officials.
Credit-rating provider Experian says a hack attack compromised a server storing sensitive personal information on millions of T-Mobile customers, including those requiring credit checks for service or device financing.
Even if China fails to live up to its promise to stop pilfering corporate trade secrets, as America's spy chief predicts, the U.S. could still benefit diplomatically from the two nations' cybersecurity agreement.
The commoditization of attack infrastructure and services in the cyber-criminal underground, and the low cost and ease of launching targeted attacks, are growing concerns that require new defense strategies, says Trend Micro's Raimund Genes.
The hotel chain bearing 2016 U.S. presidential candidate Donald Trump's name has confirmed that its point-of-sale systems were malware-infected for more than a year, but it's downplaying the possibility that card data was exfiltrated or used to commit fraud.
The severity of the U.S. Office of Personnel Management breach continues to grow, with investigators now reporting that hackers stolen 5.6 million people's fingerprint data. The theft may have security implications well into the future.
The attacks have evolved, breaches have multiplied, and serious security gaps have been exposed. But what most concerns FireEye President Kevin Mandia? The rise of nation-states as leading threat actors.
For years, information security experts have been warning users to create complex, unique passwords, and organizations to secure them properly. But an analysis of 12 million cracked Ashley Madison passwords shows how much we're still failing.
A second Russian has pleaded guilty in connection with the largest U.S. hacking scheme, which compromised more than 160 million payment card numbers. But three other alleged conspirators have yet to be arrested.
A security road map guides your team's projects and initiatives. Even more importantly, it explains to your key stakeholders how you're using the budget and resources given. Don't fall into the old routine of simply listing the technologies you'll implement and integrate over the next year; use the road map to...
Mobile devices have become critical in today's digital workplace. But most organizations lack the security to ensure they, and the data they contain, are secure. Most
security teams cannot fully account for - let alone monitor - the vast array of apps that have access to valuable corporate data.
Download this...
President Obama characterizes hacks of American businesses by Chinese hackers as an "act of aggression" against the United States and promises his administration will take action against the Chinese if they don't stop.
A Russian hacker who was extradited to the United States earlier this year has admitted his role in the largest hack attack in U.S. history, which resulted in the theft of 160 million payment card numbers. Find out how much time he could spend in prison under his plea agreement.
FBI Special Agent Charles Gunther says collaboration with FinCEN, international law enforcement and U.S. banks has helped the FBI recover millions of funds stolen from customers via emerging wire fraud schemes.
Email fraud is rife and costs companies like yours millions every year.
Implementing the authentication standard DMARC (Domain-based Authentication Reporting and Conformance) to block bad email before it reaches consumer inboxes is a great first step. But DMARC isn't enough. Real-time email threat intelligence...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.eu, you agree to our use of cookies.