In the aftermath of a payment card breach, as fraudsters race to exploit the stolen information, card issuers and affected customers take steps to mitigate risks. Here's a look at the lifecycle of a payment card breach from three perspectives.
ENISA - the EU agency responsible for bolstering European cybersecurity practices - is calling on Internet infrastructure providers to adopt best practices for combatting routing threats, DNS spoofing and poisoning attacks, as well as DDoS disruptions.
President Obama says he sees the need for law enforcement to gain access to terrorists' encrypted data, but stops short of calling for a law to require manufacturers to provide a so-called "backdoor" to break encryption on mobile devices.
An increasing number of cyber-attacks are not being launched by governments - or their intelligence services - but rather by opportunistic mercenaries offering "espionage-as-a-service," according to a new report.
The U.S. and U.K. plan to hold "cyber war games" to help them prepare for defending against online attacks. Meanwhile, hackers have targeted 19,000 French websites with DDoS attacks and defacements since the Paris massacre.
British Prime Minister David Cameron reportedly plans to lobby U.S. President Barack Obama to criticize technology companies that offer encrypted communications that cannot be cracked by law enforcement or intelligence agencies.
Following the Paris terror attacks, the French government plans to strengthen its surveillance laws, while the British prime minister has promised to allow intelligence agencies to penetrate any encrypted communications.
North Korean leader Kim Jong-un was set to star in a satirical video game, in which he battled the forces of imperialist oppression with the help of unicorns and narwals - until hackers apparently disrupted game development.
The U.S. migration from magnetic-stripe payment cards to EMV-compliant cards is in full swing, thanks in part to massive breaches at retailers. This infographic offers a timeline of progress in implementing this new technology.
U.S. Central Command's Twitter and YouTube accounts were hacked Jan. 12, reportedly by ISIS sympathizers. The account compromises came the same day President Obama proposed new cybersecurity measures, including a national breach notification law.
Following the Paris attacks, Britain's prime minister hopes to reintroduce a controversial surveillance bill known as the "Snooper's Charter." Meanwhile, many European countries - and the U.S. - plan to increase anti-terrorism collaboration.
The FBI has attributed the Sony hack to North Korea, in part by analyzing the messages left by the "G.O.P." attackers. But linguistics expert Shlomo Engelson Argamon says the messages appear to have been written by native Russian speakers.
In the wake of the Paris massacre, the head of Britain's MI5 domestic intelligence agency has called for new powers to fight extremism, warning that as terror plots increase, communications-interception capabilities are decreasing.
Nobody wants to be a cyber-attacker's first victim. But there are benefits to being second or third, says Akamai's Mike Smith. Then you get to enjoy the true benefits of the oft-discussed information sharing.
FBI Director James Comey's Jan. 7 defense of the bureau's attribution of the Sony Pictures hack to North Korea hasn't silenced many information security experts, who argue that the scant evidence divulged to date proves nothing.