An undisclosed number of Delaware restaurants may have been affected by a remote-access breach that compromised point-of-sale software, according to the Delaware Restaurant Association.
A "highly sophisticated Chinese state-sponsored actor" is responsible for a recent data breach at the National Research Council of Canada, according to Canada's chief information officer.
Are Hamas' cyber capabilities as potent as its kinetic weaponry? Israeli cybersecurity providers consider the impact of cyber-attacks on their businesses and the nation.
The website of the European Central Bank has been breached and contact information for event registrants stolen. The breach only came to light when a hacker attempted to obtain a ransom to return stolen data to the bank.
Sources say a yet-to-be-confirmed breach of payment card data linked to transactions at Goodwill Industries could be linked to a point-of-sale vulnerability that may have affected other numerous merchants.
Point-of-sale retail breaches are the rage, but they are just one cyber-crime trend on the mind of RSA researcher Uri Fleyder. What are the malware and mobile threats that organizations should monitor?
The 9/11 Commission, in its 10th anniversary report, cautions Americans and the U.S. government to treat cyberthreats more seriously than they did terrorist threats in the days and weeks before Sept. 11, 2001.
The EU Joint Cybercrime Action Taskforce pilot is set to coordinate cross-border investigations - across Europe, the United States and beyond - into cybercrime, including payment card fraud, DDoS attacks and malware rings.
Goodwill Industries has confirmed it is working with the Secret Service and others to investigate a possible payments breach. But the breach has not yet been confirmed.
A challenge examiners face in conducting forensic investigations in the cloud is that they don't have access to the servers. That's just one problem the National Institute of Standards and Technology is addressing.
Attacks are more frequent, severe and complex. How can security pros defend against the entire attack continuum - before, during and after? Cisco's Bret Hartman describes a threat-centric approach.
Two zero-day vulnerabilities reportedly were exploited by the attackers who hacked NASDAQ's systems in 2010. While a senior U.S. legislator claims the hackers had "nation-state" backing, security experts say it's still not clear who hacked NASDAQ or why.
A security expert and average consumers respond differently to the eBay breach. As most customers retain a high degree of faith in online merchant security, the expert believes eBay committed a serious sin in its lack of strong authentication.
It's unlikely that the downing of a Malaysian airliner by an anti-aircraft missile over Ukraine and the air and land battles in Gaza could expand into a cyberwar. Here's why.
A U.K. official urges financial services companies to share cyberthreat information with peers as well as directly with government agencies. But many legal questions remain.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.