While security experts are predicting a significant uptick in point-of-sale attacks, as usual, during the holiday shopping season, they say retailers are better prepared to fight fraud because they've beefed up security.
The U.S. Postal Service on Nov. 10 confirmed a data breach that affected some of its information systems. This infographic offers a timeline of the breach investigation provided by an official during a Congressional hearing.
A Russian website is streaming live footage accessed without authorization from cameras around the world. The exposure highlights the dangers of weak passwords and the need for organizations to vet the security settings of all Internet-connected devices.
Retailers cannot avoid innovation. Yet, cybercriminals thrive when retailers innovate. What, then, can retailers do to stop cybercriminals from breaching their defenses? Here are three key questions to answer.
The director of the National Security Agency, Navy Admiral Michael Rogers, says he expects to see adversaries launch a cyber-attack in the next few years aimed at severely damaging America's critical infrastructure.
India's approach to security may be disconnected from the threat reality, says Sivarama Krishnan of PwC. Security budgets are in decline, but the cost of breaches increases. Government must lead by example.
Cybersecurity specialists need to learn to think like an adversary in order to develop sound defense strategies, says Greg Shannon, chief scientist at the CERT Division of Carnegie Mellon University's Software Engineering Institute.
Testifying at a House hearing, a U.S. Postal Service official defended the delay in notifying USPS workers of a breach that exposed Social Security numbers, contending authorities initially didn't know what data was pilfered.
Foreign spy agencies have powerful incentives to hack U.S. government IT systems, and that won't change, experts say, as they react to suspected Chinese involvement in the breach of National Oceanic and Atmospheric Administration websites.
Organizations in all business sectors should take a series of steps to guard against "visual hacking," a low-tech method used to capture sensitive, confidential and private information for unauthorized use.