Eddie Bauer Hacked by POS Malware

'Sophisticated Attack' Siphoned Card Data for 6 Months, Retailer Warns
Retailer Eddie Bauer is warning customers that their payment card data may have been compromised by point-of-sale malware during a... Read more »

Sage Group’s Very Bad Month

Police Arrest Insider After Breach; Software Misuse Issues Arise as WellPolice have arrested an employee of U.K.-based accountancy and business software developer Sage Group after a data breach. Meanwhile, a report has... Read more »

A New Way to Mitigate USB Risks

Open Source Software Blocks Malicious Actions, Researchers SayUSB devices and ports pose serious risks, and they aren't going away anytime soon. But researchers say they've developed a way to block malicious actions... Read more »

Mystery Surrounds Breach of NSA-Like Spying Toolset

Code is Likely Legit, But a Bit Sloppy, Experts SayAn unparalleled mystery has piqued the security community's curiosity. A group calling itself the "Shadow Brokers" claims to have stolen code and exploits... Read more »

Researcher Unleashes Ransomware on Tech-Support Scammers

Fun Factor Aside, 'Hacking Back' Carries Legal RisksMalware researcher Ivan Kwiatkowski unleashed ransomware on tech-support scammers after his parents stumbled across a site warning they'd been infected by Zeus. Despite the feel-good... Read more »

4 Questions the Board Must Ask Its CISO

Drilling Down on Cybersecurity Plans
Vikrant Arora, CISO of NYC Health & Hospitals, offers the four most important questions a board must ask the CISO to get a good understanding of how the... Read more »

Report: SWIFT Screwed Up

Before Bangladesh Bank Heist, SWIFT Allegedly Overlooked Smaller Banks' SecuritySWIFT screwed up. That's the takeaway from a new report into the Brussels-based cooperative, which alleges that the organization overlooked serious concerns relating... Read more »

When a DDoS Attack Isn’t a DDoS Attack

A lesson from down under: A report on unintentionally creating a distributed-denial-of-service attack aimed at oneself highlights the latest edition of the ISMG Security Report. Also, a report on interpreting HIPAA privacy... Read more »

Using Cybernetics to Tell the Security Story

Sam Lodhi, CISO of UK's Medicine and Health Products Regulatory Agency, speaks about adapting biological cybernetics to help management understand information security risk better and how cybernetics can be applied to other... Read more »

Building a Better Defence

As new schemes from hackers get more disruptive and harmful, it is critical to scale up defences, disrupt these attacks and make your organization a lesser target. Alex Holden, founder and CISO... Read more »