Prosecutors recommended that twin brothers Muneeb and Sohaib Akhter serve a six-year and a two-year sentence, respectively, after pleading guilty to hacking-related charges. But one of the men received a much lighter sentence.
The Court of Justice of the European Union has ruled that the EU-U.S. Safe Harbor data sharing agreement is invalid because the United States has failed to safeguard Europeans' privacy rights. Legal experts say the judgment is a direct response to Edward Snowden's revelations.
As cyber threats rise, industry experts see an opportunity to involve government and private entities in building the capacity of security professionals through effective partnerships and cybersecurity clusters.
As a result of Experian's data breach, 15 million T-Mobile subscribers are at risk from phishing attacks and fraud. But it's not clear what more T-Mobile can do to protect breach victims, says security specialist Mark James.
Cyber-insurance holds promise for enterprises looking to suitably cover risk in an unpredictable, and rapidly evolving information security landscape. Dinesh Bareja shares his thoughts on setting the groundwork.
Discount brokerage firm Scottrade says hackers accessed its computer network and stole names and street addresses of millions of its clients. The firm says it learned of the intrusion from law enforcement officials.
Gartner research director Craig Lawson discusses three waves of threat intelligence services that can be leveraged by enterprises in building a threat detection model, while emphasizing what is driving the third wave.
Even if China fails to live up to its promise to stop pilfering corporate trade secrets, as America's spy chief predicts, the U.S. could still benefit diplomatically from the two nations' cybersecurity agreement.
In addition to having a dedicated individual or team responsible for privacy matters, organizations must ensure their information security and IT staffs are knowledgeable about data privacy issues, says Trevor Hughes, CEO of the International Association of Privacy Professionals.
The commoditization of attack infrastructure and services in the cyber-criminal underground, and the low cost and ease of launching targeted attacks, are growing concerns that require new defense strategies, says Trend Micro's Raimund Genes.
Cybercrimnals are now using the Dyre and Dridex banking Trojans to gather massive amounts of data about individuals and companies that could enable them to track patterns of behavior, which might later help them evade intrusion detection, says Fox-IT's Eward Driehuis.
Defeating biometrics-based security with far-fetched schemes, such as stealing or replacing eyeballs and fingertips, is a recurring theme in the movies. But real-world advances in authentication will help make it difficult to circumvent real-world security.
The U.S. and China, as part of a cybersecurity agreement, have agreed not to conduct or knowingly support cyber-enabled theft of intellectual property with the intent of providing competitive advantages to companies or commercial sectors.
The cyber expert panel formed by the ministry of Home Affairs late last year came up with its plan to tackle cybercrime in India. Security experts recommend that the ministry focus on state-level skill development.