Another day, another data breach in the news. Ransomware at a hospital, the latest IRS breach, a phishing scam at Snapchat . . . you tune out the details. For every breach that makes headlines, dozens of other organizations have had data stolen or corrupted by hackers...or even their own users. Cyberthreats become...
March saw the arrival of a new, so-called "Fappening/ Celebgate" scandal, where leaked images and videos of naked celebrities found their way onto the web...prime real estate for scammers who started peddling numerous links across sites like Reddit and all social networks. Likewise in February, Fortune reported a tech...
Today's threat landscape constantly throws new problems at organizations already struggling to keep up with yesterday's issues. New malware, ransomware, botnets, and fileless attacks target a growing list of enterprise vulnerabilities with clever new exploits and social engineering tactics, and these attacks are...
Paid breach notification site LeakedSource has disappeared. Given the site's business model - selling access to stolen credentials to any potential buyer - breach notification expert Troy Hunt says the site's demise is no surprise.
Europe's GDPR has business leaders everywhere talking about privacy. But are they having the right conversations? Michelle Dennedy, chief privacy officer at Cisco, offers her perspective.
Conventional wisdom has long held that humans, because of the mistakes they make, are the weakest links in the security chain. But that's not so, says Rohyt Belani of PhishMe, who explains why.
Information Security Media Group has a team of editors covering RSA Conference 2017. What are the hot topics from the show floor? Who are the key thought leaders on camera in ISMG's video studio? See and hear highlights from the first two days of the event.
A researcher claims WhatsApp has dismissed his finding that there's a backdoor in the application that could allow attackers to unlock encrypted messages. But the controversy is more nuanced - and for most of us, much less threatening - than it might first appear.
The House has easily approved a heavily reworked version of the 21st Century Cures bill that was stripped of controversial proposed changes to HIPAA. The measure, which would provide $6.3 billion for various efforts to advance medical innovation and is backed by the White House, will proceed to the Senate next week.
The Domain Name System is crucial to the functioning of the internet, but largely taken for granted - until it breaks. In an audio interview, Cricket Liu of Infoblox discusses how DNS providers must improve security.
Intellectual property and protected health information are both extremely valuable to cybercriminals, which is why hackers are increasingly targeting healthcare organizations. Increasingly, patients, providers, pharmaceutical companies and others are relying heavily on mobile devices to exchange sensitive information,...
It takes vigilance, resources and effort to ensure that protected health information is secured on all devices where it resides. Organizations must create a complete inventory of all devices containing PHI, and then implement all necessary steps to ensure it stays secure, no matter where it's stored. In this session,...
Data loss is an ongoing concern for all organizations. At the same time the world we work in has changed and people - and their data - are increasingly mobile and on an ever-growing number of devices and applications. Businesses need to secure their data and comply with regulations, without slowing down their users....
Australia's census debacle has prompted questions over whether main contractor IBM made errors, and if the Australian Bureau of Statistics underestimated the resources it needed to successfully power a busy, online service.
The Australian Bureau of Statistics took its online census submission form offline after several distributed denial-of-service attacks, a move that is likely to only fuel worries over privacy and data safety.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ddos.inforisktoday.com, you agree to our use of cookies.