"We infiltrated a server on their network that basically had no security measures in place," according to the posting of the hacking group. "We were able to run our own application, which turned out to be a shell and began plundering some booty."
Minnesota has seen an increase in malicious traffic since the state government shut down a week ago, but state CISO Chris Buse says sophisticated intrusion-detection systems and an alert skeleton staff have prevented any harm from being done, at least to the part of state government IT controlled by the Office of...
We all know the cost of regulatory compliance - how expensive it can be to meet the standards of HIPAA, HITECH and other industry guidelines. But two organizations this week learned hard lessons about the cost of non-compliance.
A Twitter posting by Pacific Northwest National Laboratory, which conducts IT security research and development, says: "A sophisticated cyberattack has shut down Internet and e-mail at PNNL. Full access will be restored once we can repel further attacks."
The U.S. Department of Health and Human Services' Office for Civil Rights entered into a resolution agreement with the University of California at Los Angeles Health System to settle violations of the HIPAA Privacy and Security Rules.
RSA customers who feel victimized by last March's breach of the security vendor's computers have viable options that include continued use of the SecurID authentication tokens, those offered by competitors, or something entirely different: biometrics.
Despite increased incidents, major U.S. card issuers receive poor marks for card fraud prevention, according to a new study from Javelin Strategy & Research. The biggest area of concern: card-not-present fraud.
"Any other bank could have just as easily been victimized," says banking fraud expert Shirley Inscoe, following the arrest of a former Citigroup executive charged with embezzling more than $19 million.
Eddie Schwartz, the new - and first - chief security officer of RSA, says the IT security provider hit by a sophisticated advanced-persistent-threat attack in March is focusing internal security on efforts to reduce the time an intruder can go undetected.