Two servers that have protected hundreds of thousands of Internet users will be shuttered early next week, meaning that a number of people won't be able to access the Internet. But for most users, the event will go unnoticed. Here's why.
People receiving IT security graduate degrees are highly educated, but as the Center for Internet Security's William Pelgrin says, "We have a deficit of those individuals who can pick up the ball and run with it very quickly." He's doing something about that.
Learning how alleged fraudsters hacked systems and traded in stolen credit- and debit-card numbers can help organizations take steps to protect their customers' and stakeholders' sensitive information.
In what is being called "the largest coordinated international law enforcement action in history directed at carding crimes," 24 suspects have been arrested in a fraud scheme likely involving more than 400,000 accounts.
A new malware intelligence system created by Georgia Tech Research Institute aims to create an information sharing center. How will the system work and how can organizations participate? GTRI's Chris Smoak furnishes the answers.
"This is about preparing the battlefield for another type of covert action," a former high-ranking U.S. intelligence official says. "Cyber collection against the Iranian program is way further down the road than this."
LinkedIn's failure to comply with long standing industry standard encryption protocols jeopardized its users' PII, and diminished the value of the services, the class action federal lawsuit filed in northern California says.