The identity of the individual or group behind the global WannaCry ransomware campaign remains unclear. But whoever wrote the ransom notes appears to have been fluent in Chinese and pretty good at written English, according to a linguistic analysis from security firm Flashpoint.
Voice biometrics: Is it good enough to protect people's bank accounts? Also, the ISMG Security Report goes to Belfast, Northern Ireland, for this year's OWASP AppSec Europe conference, including a visit to the Titanic museum - hopefully not a metaphor for the discipline.
In a rare acknowledgment of a data breach by an Indian company, online restaurant guide and food ordering service Zomata says 17 million users' email addresses and hashed passwords were stolen from its database. The company was hacked by a white-hat hacker back in 2015.
Disney is reportedly being targeted by cyber-extortionist hackers who have threatened to release a stolen, prerelease copy of the movie studio's fifth "Pirates of the Caribbean" film unless they receive a ransom, payable in bitcoins.
Microsoft has issued emergency security updates for some unsupported operating systems to protect against the global WannaCry ransomware outbreak. In addition, a researcher has accidentally disabled new infections from crypto-locking PCs, though he warns the respite will likely be temporary.
The cybersecurity epitaph of the fired FBI director could read: "He showed courage to take on Apple." Comey publicly battled Apple CEO Tim Cook over unlocking the iPhone of the San Bernardino shooter, becoming the face of the proponents who seek ways to bypass encryption on mobile devices.
President Donald J. Trump has fired FBI Director James Comey, a divisive figure who led the law enforcement agency through an unprecedented presidential campaign tainted by Russian hacking and an investigation into Hillary Clinton's handling of classified emails.
The latest ISMG Security Report leads with an account of FBI Director James Comey's testimony before the U.S. Congress on insiders posing a cyberthreat to the American law enforcement bureau. Also, dissecting the claim that most startups fail shortly after being victimized by a cyberattack.
Many companies today design their cyber security strategy around an incident centric approach - how & when did the hack occur? But this approach leaves out a critical component that can be the difference between a reactive and proactive strategy, the threat actor behind the hack. Join us to learn how a cyber strategy...
Cyber threats pose a risk to federal agencies accomplishing their designated missions. By following best practices to simplify security intelligence, an agency reduces the burden on its security operations team and allows technology to do the work of surfacing and responding to cybersecurity threats.
Here are five cyber-related takeaways from FBI Director James Comey's testimony before the Senate Judiciary Committee, including his rationale on notifying Congress of his decision to reopen the probe of Hillary Clinton's use of a private email server and steps the bureau is taking to defend against the insider threat.
Travel industry software giant Sabre has alerted hotels that its software-as-a-service SynXis Central Reservations system - used by more than 36,000 properties - was breached and payment card data and customers' personal details may have been stolen.
The figure sounds alarming, 60 percent of small companies went belly up within six months of a breach. And that stat was repeated several times by lawmakers as a House panel debated - and approved - a bill aimed at helping small businesses battle hackers. But is that number true?
Most sophisticated organizations have had their incident response plans in place for several years. But the landscape has changed, and incident response plans and planning that remain static are at risk of being counter-productive in today's environment. If you haven't dusted off your plan in even a couple of years,...
Interpol, working with countries and security vendors, says it has uncovered 270 websites - including some government portals - compromised by malware. In some instances, the websites contained personal data of citizens.