Steps to Implementing a Zero Trust Network
Steps to a Zero Trust Network – Planning for Network Security Part 2 In my previous SecurityWeek column, I wrote about a variety of network security best practices that you should be planning for in...
View ArticleEmail-Hacking-for-Hire Services Shut Down in International Enforcement Operation
Law enforcement agencies across the world joined forces to take down two people operating an email hacking site based in the U.S. as well as others linked to similar hacking sites in other nations. In...
View ArticleObama to Name US Admiral as New NSA Director: Report
WASHINGTON – President Barack Obama is expected to name a US Navy admiral as the next head of the embattled National Security Agency, the Washington Post reported Monday. If confirmed by lawmakers,...
View ArticleBitcoin Dealers Charged in US With Money Laundering
NEW YORK – US authorities Monday filed criminal charges against two operators of a Bitcoin exchange which enabled its users to buy drugs and other illicit goods on the Silk Road underground website....
View ArticleEasyDraft Data Breach Exposes Bright Horizons Customers’ Financial Data
An undisclosed number of customers’ names, bank routing numbers and bank account numbers were mistakenly exposed.
View ArticleFour Jailed in Puerto Rico for Identity Theft
The four men operated as identity brokers in cities across the U.S., selling stolen identies for prices ranging from $700 to $2,500.
View ArticleFBI Warns of More Retail Credit Card Breaches
The FBI has already uncovered about 20 breaches in the past year that leveraged the type of malware recently used against Target and Neiman Marcus.
View ArticleTake Avast’s Privacy IQ Quiz and Win Prizes
IT security solutions provider Avast has announced another interesting contest: the Privacy IQ quiz. If you think you have solid knowledge about online privacy, or if you simply want to test your...
View ArticleBay Dynamics Launches Risk Fabric Portal to Identify Threat Patterns
Bay Dynamics, a provider of information risk intelligence solutions, today launched a new portal designed to help customers identify threat patterns, trends and behaviors based on deviations from...
View ArticleAssociation Launches Initiative to Help Retailers Improve Data Security
In response to a spate of cyber attacks targeting retailers nationwide, the Retail Industry Leaders Association (RILA) announced on Monday that it would help its members improve their cyber defenses by...
View ArticleJava Bot Can Launch DDOS Attacks from Windows, Mac and Linux Machines
Security researchers have come across a malicious Java application thats designed to launch distributed denial-of-service (DDOS) attacks from infected computers. The interesting thing about this threat...
View ArticleAutonomous Cars Will Surely Be Targeted by Hackers, Expert Says
Eddie Schwartz, VP of global security solutions at Verizon, warns that hackers will start testing the security systems on autonomous cars as soon as they hit the streets. Google and many major car...
View ArticleMongoHQ Adds New Security Features in Response to Breach
After experiencing an attack last year that exposed customer accounts and database instances at cloud-based database serviceMongoHQ, the company on Tuesday said that it has added new security features,...
View ArticleBritish PM Cameron’s ex-media chief knew of phone-hacking
Former News of the World editor Andy Coulson arrives at the Old Bailey courthouse in London January 28, 2014.
View ArticlePhishing Attacks Expose 1,800 UC Davis Patients’ Data
The information exposed includes patient names, medical record numbers and limited information associated with clinic visits or hospital admissions.
View ArticleMichaels Acknowledges Possible Credit Card Breach
The company says it’s working with law enforcement to investigate ‘possible fraudulent activity’ on payment cards that had been used at Michaels.
View ArticleHasbro.com Hacked, Serves Malware
Kaspersky, Microsoft and Trend Micro all currently fail to detect the malware, according to VirusTotal.
View ArticleCoca-Cola Breach Exposes 74,000 People’s Personal Data
Several unencrypted laptops were stolen by an employee who had been assigned to maintain or dispose of them.
View ArticleCanada Privacy Czar Warns Against Spies Trawling Social Media
OTTAWA – Canada’s interim privacy commissioner on Tuesday urged lawmakers to crack down on government spies who trawl without cause on social media websites to gather people’s personal data. “It is our...
View ArticlePatnote Virus Used to Distribute ZeuS Trojan
Security researchers from Trend Micro have spotted an interesting malware distribution campaign. Cybercriminals are using the Patnote (Pioneer) virus to spread ZeuS (Zbot). When the Patnote file...
View Article