U.S. merchants that aren't able to accept EMV chip cards by October should be bracing for significant upticks in card fraud expenses. Unfortunately, many merchants are far from prepared.
CareFirst BlueCross BlueShield is the latest health insurer to be targeted by a sophisticated hacking attack. It recently discovered that an intrusion into a database in June 2014 resulted in a breach affecting 1.1 million individuals.
"Millions" of devices from numerous router manufacturers appear to use a third-party software component called NetUSB, which can be exploited to bypass authentication checks and remotely take control of the devices, security researchers warn.
Numerous websites, mail servers and other services - including virtual private networks as well as "all modern browsers" - have a 20-year-old flaw that could be exploited by an attacker, computer scientists warn.
Unlike previous presidential campaigns, cybersecurity will be raised by candidates on the hustings, although the issue likely won't play a big role in determining the election. Two GOP candidates - Marco Rubio and Rand Paul - already have broached the topic.
Federal authorities have arrested a Chinese professor, accusing him of pilfering trade secrets from the computer systems of American high-tech companies where he and a co-conspirator once worked.
Did information security expert Chris Roberts exploit vulnerabilities in airplanes' onboard entertainment systems, allowing him to access a plane's thrust management computer and cause it to climb?
An army of 40,000 small office/home office routers have been exploited by automated malware. But who's responsible for devices being vulnerable: vendors for using well-known defaults; or distributors and IT managers for not locking them down?
The Reserve Bank of India plans to set up an IT subsidiary to help banks strengthen cybersecurity. Banking and security leaders say this is a positive move toward responding to cybercrime trends.
Although the 2015 Healthcare Information Security Today survey shows improving regulatory compliance is priority No. 1, CISO Cris Ewell of Seattle Children's Hospital suggests building a strong information security program should be a higher priority.
Penn State University's College of Engineering computer network has been victimized by two sophisticated cyberattacks, with at least one originating from China.
Security vulnerabilities in certain infusion pumps manufactured by Hospira could allow an unauthorized user to alter the dose the devices deliver, the FDA warns. Just a few months ago, the FDA issued a medical device security guide.
The use of century-old laws and the lack of a data protection regime is hurting India's ability to combat cyberfraud, says independent adviser Nandkumar Saravade. What immediate steps must be taken?
Caffeine junkies are up in arms over reports that criminals have been targeting their Starbucks account balances. But the real story is poor password-picking practices by consumers, and Starbucks' lack of multi-factor authentication.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.