Articles

  • IRS: 100,000 Taxpayer Accounts Breached

    Stolen PII Helped Hackers Evade Authentication Defenses Eric Chabrow - May 26, 2015
    IRS: 100,000 Taxpayer Accounts Breached

    Using personal information gained from third-party sources to circumvent authentication protections, hackers breached 100,000 accounts of taxpayers who had used the IRS's "Get Transcript" application, which has been temporarily shuttered.

  • Banking's New Channels, Threats

    Cisco's Srinivasan on the Evolving Threat Landscape for Banks Varun Haran - May 26, 2015
    Banking's New Channels, Threats

    Banking is no longer just about bricks-and-mortar. With institutions increasingly adopting Web and mobile banking, the threat landscape is changing. Cisco's Pravin Srinivasan shares insight for practitioners.

  • Senate Delays NSA Bulk Collection Decision

    Will Reconvene May 31 to Decide Whether to Scrap Program Howard Anderson - May 23, 2015
    Senate Delays NSA Bulk Collection Decision

    The U.S. Senate has delayed until May 31 a decision on whether to follow the House and approve a proposal to scrap the National Security Agency's bulk collection of Americans' telephone metadata.

  • Will MasterCard, Target Renegotiate?

    Banks Reject Breach Settlement, Push Forward with Lawsuit Tracy Kitten - May 22, 2015
    Will MasterCard, Target Renegotiate?

    MasterCard's breach settlement with Target has been derailed after not enough card issuers agreed to the terms. Now MasterCard is expected to attempt to renegotiate, while banks continue with a class-action lawsuit against the retailer.

  • In Britain, Malware No. 1 Cyberthreat

    Zeus Banking Trojan Threats Still Dominate, CERT-UK Warns Mathew J. Schwartz - May 22, 2015
    In Britain, Malware No. 1 Cyberthreat

    Britain's computer emergency response team - CERT-UK - reports that malware remains the dominant mode of online attack for cybercriminals, and Zeus their most preferred tool of choice. But the team is promoting a free information-alert service to help.

  • Limiting 'Intrusion Software' Exports

    Plan Aims to Foil Adversaries from Buying Zero-Day Exploits Eric Chabrow - May 21, 2015
    Limiting 'Intrusion Software' Exports

    A U.S. Department of Commerce proposal to restrict the export of so-called "intrusion software" to prevent foreign adversaries from acquiring zero-day exploits has raised concern in the developer community.

  • Impact of N.Y. Agency Head's Departure

    Sizing Up the Fate of Planned Cybersecurity Initiatives Tracy Kitten - May 21, 2015
    Impact of N.Y. Agency Head's Departure

    Will the upcoming departure of Benjamin M. Lawsky, superintendent of the New York State Department of Financial Services, slow down recently announced plans for new cybersecurity initiatives?

  • Logjam Vulnerability: 5 Key Issues

    Don't Rush to Fix 20-Year-Old Flaw, Experts Say Mathew J. Schwartz - May 21, 2015
    Logjam Vulnerability: 5 Key Issues

    While the "Logjam" vulnerability raises serious concerns, there's no need to rush related patches into place, according to several information security experts. Learn the key issues, and how organizations must respond

  • NetUSB Flaw Affects Router Makers

    'Millions' of Devices May Be at Risk, Researchers Warn Mathew J. Schwartz - May 20, 2015
    NetUSB Flaw Affects Router Makers

    "Millions" of devices from numerous router manufacturers appear to use a third-party software component called NetUSB, which can be exploited to bypass authentication checks and remotely take control of the devices, security researchers warn.

  • Massive 'Logjam' Flaw Discovered

    Report: NSA Likely Exploited Flaw to Crack VPNs Mathew J. Schwartz - May 20, 2015
    Massive 'Logjam' Flaw Discovered

    Numerous websites, mail servers and other services - including virtual private networks as well as "all modern browsers" - have a 20-year-old flaw that could be exploited by an attacker, computer scientists warn.

ARTICLE RSA Conference: Talking Intelligence

Threat intelligence and information sharing - the quickly emerged as dominating topics at RSA...

Latest Tweets and Mentions

ARTICLE RSA Conference: Talking Intelligence

Threat intelligence and information sharing - the quickly emerged as dominating topics at RSA...

The ISMG Network