Breached PII: Growing Fraud Worry

New Account Fraud, Account Takeover Expected to GrowBy 2018, Javelin predicts that new account fraud and account takeover will eclipse present worries about POS attacks and retail breaches. Why breached PII should... Read more »

Duqu 2.0 Espionage Malware Discovered

Kaspersky Lab Suffered Cyber-Intrusion, Found APT MalwareKaspersky Lab has discovered a new, advanced persistent threat - inside its own networks. Dubbed Duqu 2.0, the malware has ties to Stuxnet, and was used... Read more »

EU Police Arrest Suspected Phishers

Cross-Border Cybercrime Gang Tied to $6.7 Million in FraudAn international police effort dubbed "Operation Triangle" has resulted in the arrest of 49 suspected members of a cybercrime group accused of launching phishing... Read more »

White House, Apple Advance HTTPS

But Experts Question Government's Security PrioritiesEncrypted browsing - using HTTPS - helps secure online communications, and Apple says developers must now employ the protocol by default. Likewise, the White House says that... Read more »

Syrians Claim U.S. Army Website Hack

Army Takes Site Offline After Apparent CDN BreachThe Syrian Electronic Army claims credit for defacing the U.S. Army's public-facing website with propaganda. Following the June 8 hack, the Army took the website... Read more »

Breach Responders Get Proactive

Organizations are getting increasingly prioritizing incident response capabilities by putting investigation firms on retainer, or creating their own internal teams, says Patrick Morley, president and CEO of Bit9 + Carbon Black. Read more »

Cybersecurity: Rebuilding U.S.-EU Trust

Two years after the leaks that showed the U.S. National Security Agency spied on America's European allies, the U.S. and Europe still need to rebuild trust so they can collaborate on defending... Read more »

DDoS Attacks Continue to Evolve

Attackers today continue to refine their distributed denial-of-service attack capabilities, delivering downtime on demand. The increase in attack effectiveness and volume demands new types of defenses, says Akamai's Richard Meeus. Read more »

Seeking Faster Data Breach Response

Last year, organizations took an average of 205 days to detect a breach. To better combat such attacks and lock down breaches, FireEye's Jason Steer says organizations must lower that to hours... Read more »

Ola Cabs Hack: An Analysis

Security Experts Weigh in on Latest DisclosureThe alleged hack on Ola Cabs comes just months after AppSec experts called out Ola's Mobile app for security lapses. We take a closer look at... Read more »