The fact that the U.S. federal government would, under some circumstances, exploit software vulnerabilities to attack cyber-adversaries didn't perturb a number of IT security providers attending the 2014 Infosecurity Europe conference in London.
Following a data breach, sensitive information, including credit card data, is often sold through the underground economy. Security experts discuss why it's so difficult to shut down online criminal forums.
Industry analysts are debating why it took retailer Michaels nearly three months to confirm a breach of its point-of-sale network, and they're asking if the breach is linked to others, including those at Target and Neiman Marcus.
Verizon's latest annual breach report shows that Web application attacks increased more than malware-fueled point-of-sale intrusions in 2013, says analyst Dave Ostertag, who provides an overview of the report's findings.
Three years ago, trust on the Internet - or the lack thereof - focused, in part, on the faceless hacking groups such as Anonymous and LulzSec. Today, we have a face for this lack of trust, and it looks a lot like Uncle Sam and a Chinese Red Army cybersoldier.
In the wake of recent high-profile retail breaches, the PCI Security Standards Council is supporting a move toward chip card technology that conforms to the Europay, MasterCard, Visa Standard, says General Manager Bob Russo.
The indictment of nine alleged participants in a fraud scheme that involved infecting thousands of business computers with Zeus malware to steal millions of dollars shows that the malware remains a formidable ongoing threat.
Analysts say it's easy to believe the Neiman Marcus data breach may be tied to attacks on Heartland Payments Systems Inc. and other entities. But tracking the crimes is one thing; prosecuting is quite another.
Advanced threats are like the weather. Everyone talks about them, but few have a solid defense plan - or even a solid understanding of the threat landscape. Mike Nichols of General Dynamics Fidelis Cybersecurity Solutions offers insight.
In many if not most enterprises, the chief information security officer reports to the chief information officer. After all, enterprises cannot function without IT, and security is a support function to safeguard data and systems. Or is it?
Houston-based liquor store chain Spec's says its network was attacked by malware back in October 2012, and the intrusion, which exposed card data and other information, may have continued until as late as March 20, 2014.