FBI Reportedly Probing Hack AttackWeb.com won't confirm or deny that its Register.com subsidiary, which manages more than 2 million domain names, has been breached. But a news report claims the FBI is... Read more »
Attackers Skilled at Disguising 'Repeat Offenders'Once a file enters the network, we often lack the tools to monitor the file's behavior. In essence, using the point-in-time model, the security professional cannot retry... Read more »
Get Your Security Fundamentals Right, For StartersAfter the complete collapse of network security at Sony Pictures - in the wake of its data breach - it's important that we highlight some of... Read more »
How the Movie Studio Fumbled Its Hack-Attack ReactionThe response by Sony Pictures Entertainment executives to the hack attack against their company provides a number of great examples for how to not to... Read more »
Sony's Experience Suggests Poor Attention To DetailThe latest entrant into the password "hall of shame" is Sony Pictures Entertainment. As the ongoing dumps of Sony data by Guardians of Peace highlight, Sony... Read more »
Employee Posted Some Client Information OnlineFinancial services company Morgan Stanley has fired an employee who it claims stole account data for hundreds of thousands of clients and posted a small subset of... Read more »
Critics Fear Move Would Increase FraudThe Reserve Bank of India is considering removal of its two-factor authentication requirement for small-value transactions. The goal: to facilitate easier transactions. But security experts fear the... Read more »
Windows 8.1 Vulnerability Unfixed After 90 Days, Google SaysMicrosoft says it's prepping a patch for a Windows vulnerability that was recently disclosed by Google. The search giant's 90-day deadline for vendors to... Read more »
U.S. Takes Action After Sony Pictures AttackHolding North Korea responsible for the cyber-attack on Sony Pictures Entertainment, President Obama on Jan. 2 imposed sanctions on 10 individuals and three entities associated with... Read more »
More and more, the applications that run your business expand beyond your organization's control to cloud-based services and partner-hosted websites. With so many separate sets of credentials and different login processes to... Read more »