The killing of an unarmed teen by police in Ferguson, Mo., has Anonymous sympathizers disagreeing on Twitter when and how to expose the identity of the shooter.
The security firm defends service, says it offers a free consumer check against more than 1.2 billion credentials stolen from over 420,000 web and FTP sites, and hashes all checked passwords to keep them secure.
A new Bitcoin advisory issued by the Consumer Financial Protection Bureau should prompt financial institutions to talk with their banking customers about the risks associated with virtual currencies.
Detecting and preventing advanced attacks isn't just a technology issue - it's a business risk that needs to be elevated to the highest levels of an organization. Trend Micro's Tom Kellermann shares strategies.
No question, the information security community - and all of us at ISMG -- lost a friend with the untimely death of Terry Austin, CEO and President of Guardian Analytics.
Researcher Joxean Koret says he's cataloged local and remote vulnerabilities in 14 antivirus applications, many of which have since been patched. But shouldn't the vendors have spotted them first?
This week's top reported breach incidents, including the report by Hold Security warning that a Russian cyber gang had breached 1.2 billion passwords, all have one thing in common: They leave numerous questions unanswered.
IT security expert Bruce Schneier, now the chief technologist at an incident response provider, sees tools that help enterprises respond to a data breach being used for other unexpected events.
Learn the top techniques for defending against ransomware attacks that encrypt stored data and demand a payoff to unlock PCs, servers, storage devices and smart phones.
Expect every new warning of cybercrime attacks, online espionage or the malware du jour to be slickly marketed, with the announcements carefully timed. But is this bad for either the information security community or attackers' victims?
A report that Russian hackers have hoarded 1.2 billion stolen passwords could prove to be an important catalyst for beefing up information security. Experts analyze the potential impact.
When it comes to incident response, organizations don't lack threat intelligence. They lack the automation, tools and the skilled staff to act on that intelligence, says Craig Carpenter of AccessData.
Delaware's recently enacted data destruction law sets itself apart from other regulations by permitting consumers, under certain circumstances, to file civil lawsuits against those who violate the law's requirements.
A report that a Russian hacker group dubbed "CyberVor" is hoarding more than 1 billion stolen passwords triggered worldwide concern, but security experts caution that scant details have been revealed, making the threat tough to judge.
A new report from Trend Micro finds that network vulnerabilities related to backdoor applications and remote access are putting more businesses at risk. What mitigation steps should be taken?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.