Nearly 50,000 personal records relating to Australian government employees as well as the employees of two banks and a utility were exposed to the internet due to a misconfigured Amazon storage server. The episode is the latest in a string of large breaches to hit Australia.
In the wake of recent massive data breaches, such as the Equifax hack, a flood of stolen data is leading to a whole new wave of account takeover crimes, says Emma Mohan-Satta of Kaspersky Lab. How can organizations refine their defenses?
Thom Langford, CISO of Publicis Groupe, says all companies should consider two essential elements when crafting an incident response plan: strong legal representation and a communications plan that considers both internal and external messaging.
The latest ISMG Security Report features highlights from the recent panel discussion at the ISMG Fraud and Breach Prevention Summit in London on preparation for the European Union's General Data Protection Regulation set to be enforced next May.
The U.S. Justice Department has identified at least six members of the Russian government that investigators believe orchestrated last year's hack of Democratic National Committee computers and dumping of stolen information and may file charges next year, the Wall Street Journal reports.
"Are we vulnerable to the attacks that are being reported in the media?" All CEOs and boards of directors should be asking that question of their information security team to ensure they don't suffer the same fate - especially when it comes to ransomware outbreaks, says David Stubley of 7 Elements.
A 21-year-old man appeared in British court this week to face 11 charges, including using DDoS attacks to disrupt sites run by Google, Pokemon and Skype, as well as money laundering and selling malware and "crypting services."
Malaysia is grappling with a sweeping data breach that exposed 46 million mobile phone records, job seeker profiles and data from medical organizations. The breach, which may have occurred in 2014, is the largest Malaysian breach to ever become public.
Managing privileged access is a much bigger and more complex job today than it was even just a few years ago, says Scott Walker of Bomgar Corp., who offers insights on factors to consider.
Under bipartisan legislation introduced in the Senate, federal authorities would share classified cyber threat information with state election officials. The bill also would provide grants to states to support election security efforts.
Stephen Soble of Assured Enterprises discusses what was most likely overlooked at Equifax prior to its massive data breach - and how organizations can avoid missing this vulnerability again.
Global hotel chain Hilton has reached a $700,000 settlement agreement with New York and Vermont over two separate data breaches discovered in 2015 that exposed more than 360,000 payment card numbers.
Technology lawyers for Twitter, Google and Facebook vowed before a Senate subcommittee on Tuesday to implement tighter controls on their platforms after finding Russia's disinformation and propaganda efforts on social media reached far more people in the U.S. than previously thought.
Following the WannaCry outbreak, the British government says it's increased cybersecurity funding for England's national health service. But in addition to funding shortfalls and poor cybersecurity practices, experts have also blamed management failures, in part by the U.K. government.
It's a score to find a severe software vulnerability in a widely used Google product. But finding information on all unpatched software flaws reported to Google is a whole new, frightening level. Here's how one researcher did it.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.