Enacting legislation to compel tech companies to help law enforcement decrypt data on mobile devices would diminish America's standing as a moral leader in the world, a nation looked up to by billions of people, even with our many flaws.
Two public sector banks recently were victims of data breaches. Experts shed more light on the possible vulnerabilities that banks and their customers have left unaddressed, and make recommendations to prevent future attacks.
Is it ever acceptable for ransomware victims to pay a ransom to obtain the decryption key required to restore access to their data? Due to poor preparation, many organizations continue to face that question.
Many APAC security practitioners have a better understanding of the big picture issues in security and new paradigms than do their counterparts in Europe, says Maurizio Garavello, VP APAC at Forcepoint.
Security experts are once again warning all Flash users to either update or uninstall the browser plug-in software to protect themselves against active exploit kit attacks that are targeting a zero-day Flash flaw to install ransomware.
The continuing success of attackers stealing billions of dollars from organizations, often through simple business email compromise scams, is a sad commentary on the state of corporate security practices as well as our collective lack of cybersecurity smarts.
A court has approved settlement of a class-action lawsuit filed by employees of Sony Pictures in the wake of its massive 2014 breach. But some legal experts say the consumer protections provided in the settlement do not go much beyond what the company should have routinely provided to victims in the wake of a breach.
A recent study reveals that India ranks third globally in financial Trojan infections, with more than 60,000 computers getting compromised in 2015 alone. Experts analyze why and recommend best practices to tackle them.
Each year the skills gap estimate for cybersecurity goes up, with few concerted, industry-wide efforts to address the issue. What organizations in all sectors truly need is hands-on, up-to-date, intensive training, says NIELIT MD Dr. Ashwini Sharma.
Luxury hotel chain Trump Hotels is investigating a possible breach that some security sources say targeted the chain's point-of-service system. If confirmed, it will be the second card breach suffered by the chain in less than a year.
The massive "Panama Papers" data leak apparently was enabled by a law firm failing to have the right information security defenses in place. The breach calls attention to the need for all organizations to encrypt sensitive data, use access controls as well as monitor access patterns for signs of data exfiltration.
Security experts worldwide are sorting through the implications of the so-called "Panama Papers" leak, involving 11.5 million records. The documents highlight an elaborate web of offshore holdings that everyone from heads of state to celebrities and fraudsters have allegedly used to hide billions of dollars.
A new coalition of leaders from government, industry and privacy advocacy groups hopes to help provide a framework for reaching a consensus on how to use IT to ensure society's security while protecting individuals' privacy, says Art Coviello, an organizer of the new Digital Equilibrium Project.
The Indian restaurant rating website Burrp was one of the recent targets for ransomware. With such incidents predicted to see a surge, experts put forth strategies to defend against ransomware and share lessons on how to minimize risks.
A panel of experts debates the ineffectiveness of the public, private partnership model in evolving a plan to develop an ideal framework to tackle cyber threats. What is needed to build an effective model to respond to future threats?