A growing number of ATM card reader eavesdropping attacks involve attackers getting in through a tried-and-true method - taking advantage of commonly used electronic access keys or codes. What can be done to stop these attacks?
A "deliberate" denial-of-service attack against state-owned LOT Polish Airlines resulted in ground crews being unable to generate flight plans. The airline now says its systems were not hacked, but rather disrupted, and that all airlines face similar risks.
Office of Personnel Management Director Katherine Archuleta tells Congress that neither she nor anyone else at OPM should be held personally responsible for a breach of agency computers in which the personal information of millions was stolen.
The hack of the U.S. Office of Personnel Management may have exposed personal information for "tens of millions" of people, a new report says, with a single database containing information for 18 million people.
The 'Cybersecurity Domino Effect' is a new term to describe the cumulative impact of multiple data breaches. How should organizations and individuals respond? Michael Bruemmer of Experian offers guidance.
Eight alleged members of an identity theft ring, including a former assistant clerk at Montefiore Medical Center, have been indicted on a variety of charges stemming from using stolen patient information to make purchases at retailers.
Polish airline LOT claims that a hack attack disrupted its ground-control computers, leaving the airline unable to issue flight plans and forcing it to cancel or delay flights, grounding 1,400 passengers.
The National Institute of Standards and Technology has issued new guidance, Special Publication 800-171, aimed at protecting federal data that's stored and processed on information systems outside the federal government.
At CA Technologies, mobile security is not just a solution for customers; it's a practice that IT security leaders have embraced internally. CA's Robert Primm discusses how to secure a borderless workplace.
While advancements in cyber security technology have brought us a long way from where we were just a year ago, many organizations are still vulnerable to attack. Read this blog to learn more about protecting yourself and your digital assets.
The U.S. Office of Personnel Management breach continues to reveal such staggering levels of information security problems, paper-pushing and seeming incompetence that it's creating a new cyber-espionage category: the "victim-as-a-service" provider.
Chris Feeney, recently named president of BITS, the technology and policy division of the Financial Services Roundtable, describes his top cybersecurity priorities, including helping members deal with insider threats.