Kirk was executive editor for security and technology for Information Security Media Group. Reporting from Sydney, Australia, he created "The Ransomware Files" podcast, which tells the harrowing stories of IT pros who have fought back against ransomware.
Former NSA contractor Harold T. Martin III., who is accused of pilfering mass quantities of highly classified information, will remain in jail until his trial. Martin engaged in "a course of felonious conduct that is breathtaking in its longevity and scale," prosecutors say.
Yahoo is appealing to the U.S. director of national intelligence to declassify an order that allegedly required the company to install secret spying software that scanned incoming email accounts for specific content.
U.S. Presidential candidate Donald Trump's business organization downplayed a finding from a UK-based researcher that the organization uses, in some cases, decade-old email software, posing significant cybersecurity risks.
An online store touting Republican Party paraphernalia was one of thousands hit by sneaky JavaScript that exported payment card details to Russia. The site is fixed, but the hack underscores ongoing challenges in securing e-commerce platforms.
A search warrant executed earlier this year gave authorities the power to force occupants of a Los Angeles-area house to unlock devices with their fingerprints, casting doubt on biometric defenses.
IoT devices running the authentication protocol OpenSSH are being compromised and used as proxies in attacks that aim to take over accounts at popular web services, according to new research from Akamai.
IoT botnets, the term for armies of hacked internet-connected devices, aren't going away. And an anecdote from the field shows the gravity of the problem and why it's unlikely to be resolved any time soon.
Under Australia's strict definition of a cyberattack, the country has never actually experienced one. The claim underscores ongoing questions about how to describe cybersecurity incidents.
Dropbox says its security has come a long way since 2012, when attackers stole 69 million login credentials. Its systems are now designed to resist and counter a breach to minimize impact on users.
For the second time in less than two weeks, a set of data released by the Australian government has been taken offline over fears it wasn't securely anonymized, posing a possible privacy risk.
Increasingly, malware designed for Apple Mac computers can access a user's webcam. But now a researcher has built a tool designed to detect if malware might be secretly recording a private call.
An NSA contractor who worked for Booz Allen Hamilton has been accused of stealing top-secret documents that the U.S. says could endanger national security. The documents are critical to a "wide variety of national security issues," the Department of Justice says.
Yahoo built a custom software program that scanned incoming emails for a specific piece of content to comply with a classified U.S. government directive, Reuters reports. If true, did the U.S. government overstep its legal boundaries?
A new kind of malware for Mac OS X has been linked to Fancy Bear, the Russian group suspected of hacking the DNC and the World Anti-Doping Agency. But the malware only poses a low risk to users, experts say.
Vulnerable internet-connected devices have been unwittingly drafted into electronic battle for DDoS attacks that have escalated to a new intensity in recent weeks.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.