An unconfirmed post-breach report for bitcoin exchange Bitstamp shows the organization was targeted by a sustained attack that combined phishing via email and Skype with macro malware to successfully steal almost 19,000 bitcoins, worth $5 million.
The FFIEC has released its much-anticipated Cybersecurity Assessment Tool. Hear why banking regulator Tim Segerson believes the tool is expected to be rolled into regulatory examinations by summer of 2016.
Europol has launched a new EU Internet Referral Unit to combat online terrorist propaganda, disrupt extremist recruitment and coordinate related intelligence-gathering and law enforcement response.
Cisco announced plans to pay $635 million to purchase cloud security firm OpenDNS to better secure the "Internet of Everything." OpenDNS says the acquisition will leave its products and personnel intact.
Would encryption, two-factor authentication and other measures stop a determined adversary from stealing millions of U.S. government personnel files? No, a former CIA CISO says. Read how Robert Bigman would defend against OPM-style cyber-attacks.
Following its mega-breach, the U.S. Office of Personnel Management suspends use of its online background check application system, citing a vulnerability. Also, the agency now faces a breach-related lawsuit filed on behalf of federal workers.
Just how bad is the U.S. Office of Personnel Management breach? Consider that spies may now have access to every secret - sexual, financial, familial, medical - shared by personnel seeking security clearances to access classified U.S. information.
Wary of intrusions, data compromise and theft, organizations increasingly are deploying privileged access management solutions. Idan Shoham of Hitachi ID Systems offers the essential do's and don'ts.
China is the "leading suspect" behind the OPM breach, says Director of National Intelligence James Clapper, who adds that until the U.S. can meaningfully deter such attacks, it must focus on getting better at defense, not retribution.
Big data analytics may be new to some healthcare organizations, but there are plenty of lessons to be learned from successful deployments. Rick Gamache of Red Sky Alliance shares some of these key lessons.
Recent breaches and regulatory audits have sharpened the focus on third-party risks. How are healthcare entities tackling this critical topic of business associate management? Attorney David Szabo shares insights.
Cybercrimes targeting healthcare organizations are growing and evolving, and much can be learned from recent breach investigations, says James Nettesheim of Mandiant, a FireEye company.
As threats evolve, healthcare organizations are embracing new solutions to protect health data. But data protection is not enough, says Microsoft's Leslie Sistla. Detection and response strategies are required.
China and the U.S. have agreed to create a new cyber "code of conduct." The move comes in the wake of the U.S. Office of Personnel Management breach, with President Obama urging Chinese officials to help lower cyber-related tensions.
European authorities say they have disrupted a Ukraine-based cybercrime gang tied to $2.2 million in fraud in Europe, the United States and beyond, perpetrated via banking Trojans, botnets and hacking-for-hire services.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.