The geneology service MyHeritage says a security researcher found 92 million email addresses and hashed passwords for its users on a private external server. The company, however, says there's no evidence of abnormal account activity or indications family trees or DNA results were affected.
Australian police in Queensland are pursuing a criminal investigation into what may be one of the first instances of a company swiping cryptocurrency using a software backdoor after a business deal went bad.
Experts have long warned that bitcoin is not as private as it appears. The very design of bitcoin, as well as some other virtual currencies, can lend a surprising amount of information about the groups using it to transact. In fact, it's sometimes easier to track than if criminals used the banking system.
Leading the latest edition of the ISMG Security Report: Cybersecurity expert Brian Honan provides insights on why organizations that are not yet compliant with GDPR need to focus on several key steps. Also: An assessment of the progress women are making in building careers in information security.
A group of cybercriminals known for their persistence and precision in executing attacks against banks' ATMs and card processing infrastructures has regrouped despite the arrest of their alleged leader.
Calling Grant West "a one man cybercrime wave," a British judge sentenced him to serve more than 10 years in prison after he admitted to hacking into businesses, spoofing 100 organizations via phishing campaigns and earning profits in bitcoins from the sale of stolen personal details.
A swift FBI sinkhole blunted an apparently imminent attack against Ukraine via "VPN Filter" malware, which has infected more than 500,000 routers. But mass router compromises will continue so long as manufacturers fail to build in easy or automated patching and updating, security experts warn.
Leading the latest edition of the ISMG Security Report: Years of massive data breaches have fueled an increase in synthetic identity fraud, in which fraudsters combine real and bogus details to create more effective fake identities. Plus, has "The Dark Overlord" hacking group finally met its match?
Mexican officials are investigating a series of technical glitches that may have been a prelude to a large cyberattack affecting at least five banks, according to news reports. While the full scope of the incidents remains unclear, up to $20 million may have been stolen.
99% of account takeover attacks begin with automation, and they pave the way for future ATO. Today's sophisticated scripts can bypass traditional measures that rely purely on device intelligence or static data. Learn how to block sophisticated attacks with behavioral biometrics before they create fraud losses.
Payments are getting faster, and so is payments fraud. A robust fraud management strategy focusing on strong authentication, customer education and scalable responses can be instrumental in minimizing payment fraud risk.
A remote code execution vulnerability revealed in late March in the Drupal content management system is now being used on a large scale for mining the virtual currency monero, a researcher says. At least 400 websites have been infected, and the total number is likely far higher, security experts warn.
You know that you've got a problem to solve but how will you address it? More importantly, who will help you address it? This is the crux of the build versus buy debate that companies are currently having with themselves.
While building and buying both have their merits, they also have costs which should be...