FBI Special Agent Charles Gunther says collaboration with FinCEN, international law enforcement and U.S. banks has helped the FBI recover millions of funds stolen from customers via emerging wire fraud schemes.
If the Chinese government hacked the U.S. Office of Personnel Management for espionage purposes, then the U.S. government's $133 million contract to provide ID theft monitoring services is a waste of money. Instead, the agency could have used the funds to safeguard its systems against future attacks.
Security experts trace many of the world's cybercrime attacks to Russia. But Russian authorities never extradite suspects, and they allow hackers to operate with impunity - if they play by some ground rules.
Security leaders must embrace new approaches to digital business in managing and mitigating enterprise risk. This was the key theme of Gartner's Security and Risk Management Summit - the first of its kind for India.
As virtualization projects continue to accelerate, organizations are discovering they have changed how datacenters are architected, built, and managed. With this evolution, there are areas of security concern organizations must address as they move, ever-increasingly, to rely on virtualization. It is important to...
Virtualization offers remarkable benefits to organizations. However, organizations that are aggressively pursuing virtualization are not realizing the full possible return on investments in virtualization. However, too often, organizations don't consider the need to identify new endpoint antimalware solutions. ...
Yet another health insurer - Excellus BlueCross BlueShield - has belatedly discovered that its systems were hacked. The breach potentially exposed information on 10.5 million individuals, was discovered in August, but appears to have begun in 2013.
Many attacks simply take advantage of known vulnerabilities or network weaknesses that have not been addressed, in which case the adversaries have no need to create custom malware but when they are employed, "zero-day" attacks are often extremely difficult to detect as they exploit hidden or as yet unknown...
The nature of today's threats has compelled organizations to adopt new tactics. Gartner's Lawrence Pingree says that attention to detection and response are at the forefront of the current evolution.
As well as being prepared to operationally and technically respond to an incident, organizations must also be prepared for the legal aspects of response. Private-sector organizations must be well versed in the response and notification processes and understand the how, what and why of the law enforcement/public agency...
Mozilla, which maintains the Firefox browser, says an attacker infiltrated its bug-tracking tools, stole information on an unpatched flaw, and exploited users for at least three weeks, before the flaw was patched.
With automation and the increasing economic feasibility of launching targeted attacks on a small scale, tier-II and III organizations housing data need to start getting concerned, says Gartner's Ahlm.
Match.com suspended all advertising on its U.K. site after discovering that one of its third-party advertising provider's networks had been infiltrated by a malware-serving campaign. The incident follows U.K. dating site Plenty of Fish recently falling victim to a similar campaign.
With enterprises increasingly concerned about advanced persistent threats, ISMG speaks to experts for recommendations on building APT resilience in their organizations - both immediate and long-term.
Sony Pictures Entertainment has reached a tentative deal to settle a class-action lawsuit filed against it, stemming from its 2014 data breach, which resulted in the leak of personal information for up to 50,000 employees.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.