A recent appellate court ruling upholding dismissal of two lawsuits against Advocate Health and Hospitals Corp. filed in the wake of a 2013 breach is yet another reminder of the challenges plaintiffs face when solid evidence of harm stemming from breaches is lacking.
The attackers behind the hack of dating site Ashley Madison - tagline: "Life is short, have an affair" - have followed through on threats and released a file that includes details on many of the site's customers.
Visa and Target have reached an agreement that reportedly will reimburse card issuers a total of up to $67 million for fraud losses and expenses tied to the retailer's 2013 breach, which exposed some 40 million payment cards.
The U.S. Office of Personnel Management has been hit with yet another lawsuit focusing on the massive breach that exposed background-check information for 21.5 million individuals. But this time, the plaintiff is a judge.
The recent FDA alert advising healthcare organizations to stop using a line of infusion pumps because of cybersecurity flaws, coupled with earlier guidance from the agency, will lead manufacturers to be more focused on risk management, predicts attorney Anna Spencer.
The Internal Revenue Service says cyber thieves may have accessed as many as 334,000 taxpayer accounts in a breach of its Get Transcript system, far more than the 114,000 accounts it originally estimated in May.
What do successful but separate malware attacks against banking customers around the world, as well as the White House and health insurer Anthem, all have in common? Researchers say the answer is shockingly simple.
Get over it. The OPM breach and the pilfering of top U.S. government officials' private emails, presumably by the Chinese government, are acceptable forms of spying. All nations with the technical means do it.
The outrage directed at Oracle Corp.'s security chief after a recent blog post in which she scolded third parties who scan the company's software looking for security flaws had a familiar ring: Do medical device makers have a similar cybersecurity attitude?
Security is a busy sector: Symantec jettisoned Veritas, Zscaler became a "unicorn" after its most recent funding round, and we have other M&A news from Cisco, Fidelity National Information Services and Proofpoint.
In a security landscape where the frenetic pace of technology has changed paradigms in ways organizations are struggling to cope with, Blue Coat's Hugh Thompson advises adopting a 'Degrees of Freedom' approach.
Did Massachusetts' first registered medical marijuana dispensary break federal or state privacy regulations by accidentally sharing patients' email addresses? Experts explain that ... well, the answer is a little hazy.
After years of neglecting data security, the healthcare sector has only itself to blame for making itself an easy target for hackers, says David Kibbe, M.D., president and CEO of DirectTrust.
Mobility has quickly evolved from being a "project" to an enterprise platform. What are the key security and privacy considerations when managing enterprise mobility? Good Technology CTO Nicko van Someren shares insight.
In June 2012, restaurant chain Penn Station was among the first retailers hit by a POS breach linked to malware. Here, in an exclusive interview, President Craig Dunaway discusses the lasting impact of the breach.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.