A controversial U.K. data-retention bill has been passed by the House of Commons after just one day of debate. But a House of Lords committee sees problems with the proposed fast-track legislation.
Federal authorities say the successful prosecution of a member of an international cybercrime ring proves progress is being made in shuttering ATM cash-out schemes. But some experts say processors and prepaid cards will continue to be targeted by attackers.
Working as a chief security officer in law enforcement is much different than filling a security role for a private sector business, says Joshua Belk, CSO at the FBI's San Francisco division, who offers career tips.
Solutionary is out with its quarterly threat intelligence report. Topping the list: the exploitability of the Heartbleed bug, and the current malware trends. Rob Kraus teases the report's highlights.
Enterprises should test the processes they establish to respond to advanced persistent threat attacks, just as they vet their business continuity plans, ISACA International President Robert Stroud says.
The National Institute of Standards and Technology should use the cryptographic community to help vet the advice it gets from the National Security Agency when creating cryptography guidance, a panel of prominent experts recommends.
The British government is seeking quick approval of an "emergency" blanket data retention law that would require U.K. telecommunications providers to store information relating to their customers' calls, texts and e-mails for 12 months.
One month after an international law enforcement effort targeted the Gameover Zeus banking Trojan, new versions of the malware are being distributed via spam campaigns.
Microsoft absolves dynamic DNS provider No-IP of being complicit in a malware campaign that infected millions of PCs and apologies to the 1.8 million customers who experienced outages.
The Department of Homeland Security confirms that "a potential intrusion" of the Office of Personnel Management's network occurred in March but says officials have not identified any loss of personally identifiable information.
Why is the National Institute of Standards and Technology developing new cybersecurity standards based on the same principles engineers use to build bridges and jetliners? NIST's Ron Ross explains.
With the Senate Intelligence Committee overwhelmingly approving the Cybersecurity Information Security Management Act, common wisdom dictates the bill will head directly to the Senate floor. Not so fast.
Criminals have begun targeting ATMs in Western Europe using malware, as well as a new generation of stealthier skimmers designed to capture card data and PIN codes. But the stolen data is often used for fraud elsewhere, especially the U.S.
The idea of a cyber war council, reportedly proposed by a financial services industry trade group, has not received an enthusiastic reception from cybersecurity experts, some of whom question its viability to defend against cyberattacks.
The Senate Intelligence Committee, by a 12 to 3 vote, has approved the Cybersecurity Information Sharing Act of 2014, which its sponsors say would encourage the federal government and private sector to voluntarily share cyberthreat information.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.