North Korea criticizes President Obama for backing the release of a comedy about the assassination of its leader, denies ordering the hacking of Sony Pictures and blames the U.S. for its Internet and mobile network outages.
Distributed-denial-of-service attacks, fueled by the interconnected nature of smart devices, will only continue to increase, says Matt Moynahan, president of Arbor Networks. "The infrastructure itself is insecure," he says.
The U.S. Secret Service last year refused to provide DHS with information about vulnerabilities culled from the continuous monitoring of the protective service's IT systems as required by FISMA.
The Christmas Day disruption of Sony's PlayStation store and Microsoft's Xbox Live network continue into a second day, with a hacking group known as Lizard Squad on Twitter claiming responsibility for the attacks.
While the FBI may have attributed the hack attack against Sony Pictures Entertainment to North Korea, many information security experts remain unconvinced, based on the evidence that's been released to date.
The Sony data breach is the top security news story of 2014, and ISMG has provided thorough coverage of the incident. Following is a comprehensive guide to Sony breach news, analysis and commentary.
Nobody wants to be a cyber-attacker's first victim. But there are benefits to being second or third, says Akamai's Mike Smith. Then you get to enjoy the true benefits of the oft-discussed information sharing.
After the complete collapse of network security at Sony Pictures - in the wake of its data breach - it's important that we highlight some of the organization's fundamental security mistakes. Here's a macro view of the lessons we must all learn.
In the wake of a data breach that followed a routine regulatory, a former regulator is asking why the agency failed to disclose the breach sooner, and why it has not accepted more responsibility for its error.
Once a file enters the network, we often lack the tools to monitor the file's behavior. In essence, using the point-in-time model, the security professional cannot retry the file for guilt or innocence.
A new report now claims the breach at JPMorgan Chase is linked to a server the bank's security team overlooked when upgrading to two-factor authentication controls. Why that oversight and a well-planned spear-phishing attack were all hackers needed.
Seeking a measured response to an attack on a non-critical infrastructure company requires carefully balancing a strong message to North Korea with one that doesn't result in escalating an encounter with a rogue nuclear nation.
A week after Sony Pictures canceled the release of the upcoming film "The Interview," the studio is now planning a limited run of the movie. Also, a congressman has sent a letter to Sony requesting details on the cyber-attack.
In determining the right time to issue a breach notification, organizations have to carefully weigh the risk of premature notification based on insufficient facts versus tardy notification that can have an impact on their reputation.
A sophisticated hacking group in Eastern Europe with ties to banking Trojans like Carberp has now been linked to attacks waged against 16 U.S. retailers. Could U.S. banks be the next big targets?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.