Russian and European malware and spam purveyors have been hijacking Internet routes. Pending a massive infrastructure upgrade, security experts warn that such attacks can be detected, but not easily blocked.
A new report claims that Russian hackers, using spear-phishing attacks, breached the Sony Pictures Entertainment network by November 2014. But it's not clear whether they were responsible for the "G.O.P." attacks attributed by the FBI to North Korea.
The Obama administration has taken new, but modest steps to limit the ability of intelligence agencies to collect data on individuals, but the new policy doesn't end the bulk collection program revealed by former NSA contractor Edward Snowden.
Target Corp. has replaced its "interim" CIO, who was named to the post last year following its massive 2013 data breach that compromised 40 million credit card numbers and exposed personal details on 70 million customers.
Gartner analyst Sid Deshpande portrays a positive picture of increased security spending, deployment of focused security technologies and a concerted approach to streamline security infrastructure in 2015.
Eighty-six percent of Indian security practitioners agree there's an acute shortage of skilled cybersecurity professionals. What should be done to fill the gap? And what are the risks if we don't?
President Obama says his proposed cybersecurity budget is designed to help prevent foreign nations or hackers from shutting down American networks, stealing trade secrets or invading the privacy of American families.
For the third time in recent weeks, in-the-wild attacks are exploiting a newly discovered zero-day vulnerability in
Adobe's Flash plug-in for Web browsers, Trend Micro reports.
Hackers posing as women on Skype tricked Syrian opposition fighters into infecting their systems with malware, which furnished the hackers with "valuable insight into military operations," according to a new report from cybersecurity firm FireEye.
Even a few weeks after the RBI announced its plan to consider removal of the two-factor authentication requirement for small-value transactions, security critics continue to react strongly against the notion.
Starting in April, Singapore plans to have a dedicated and centralized cybersecurity agency. But experts question whether the agency can take a holistic approach and effectively coordinate with industry.
Leading this week's industry news roundup, IBM announces Identity Mixer, a cloud-based encryption technology designed to protect personal data online, while Proofpoint releases its Enterprise Protection Suite 8.0.
Chinese authorities reportedly want foreign software and hardware vendors that sell to its banking sector to share source code and encryption keys. Western technology firms have reacted with alarm.
As the use of consumer health devices and applications grows, so do privacy and security concerns, says a new Federal Trade Commission report. Learn about the precautions the FTC recommends.
Threat information sharing was among the cybersecurity topics discussed during U.S. President Obama's recent visit to India. Does this signal a new era in Indo-U.S. cyber relations?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.