Several state attorneys general are investigating the data breach at eBay, which potentially exposed the encrypted passwords of 145 million customers. Plus, the New York AG is asking the company to provide free credit monitoring to those affected.
eBay is urging its 145 million customers to change their passwords following a cyber-attack on a company database that compromised encrypted passwords and other personal information. Learn how and when the attack originated.
There are a number of reasons why the U.S. government indicted five Chinese army officers for hacking American corporate computers to steal intellectual property. Bringing the assailants to justice isn't one of them.
A group of noted cryptographers, academics and business leaders will provide an independent assessment of the way the National Institute of Standards and Technology develops cryptographic standards and guidelines.
Class action lawsuits that banking institutions filed against Target Corp. in the wake of the retailer's massive breach are being consolidated. The suits seek recovery of expenses, such as the cost of re-issuing affected payment cards.
Organizations looking to build a better breach response strategy need to emphasize the basics, including ensuring they have a well-qualified response team in place, security experts, including attorney Ron Raether, advise.
Consumers around the world aren't overly concerned about Internet security, perhaps because they've experienced fatigue from the oversaturated media coverage of data breaches, Unisys Chief Information Security Officer David Frymier says.
In the wake of large-scale breaches against retailers, including Target, the Retail Industry Leaders Association has launched an information sharing center in an effort to strengthen defenses against cyber-attacks.
Conventional wisdom dictates that the high demand for IT security practitioner would cause salaries to rise, perhaps significantly. But a new study by SANS shows only a slight fattening of paychecks for many IT security professionals.
The UK Information Commissioner's Office says that neglecting to keep software security up to date and failing to encrypt online communications are among the top cybersecurity vulnerabilities at government and private-sector organizations.
To address new features and new threats, the National Institute of Standards and Technology has revised its guidance for transport layer protocol. Learn about the recommendations for protecting data during transmission.