Except for the leak of celebrities' private data, the "wiper" malware attack against Sony Pictures Entertainment shares "extraordinary" similarities with previous wiper attacks in Saudi Arabia and South Korea, a security researcher finds.
A remote-access attack that compromised a parking facility provider with locations in Illinois, Pennsylvania, Ohio and Washington highlights how commonly used point-of-sale terminal and software brands are increasingly being exploited by hackers.
The destructive code that was used to infect and erase hard drives at Sony Pictures Entertainment - and which apparently was the subject of a recent FBI "flash alert" - has been identified as "wiper" malware known both as Destover and Wipall.
Who hacked Sony? Not us, say the North Koreans, ending days of silence. As Deloitte becomes the latest victim of the G.O.P. gang that's claimed credit, one thing is certain: Sony won't have to buy the movie rights to this hacking story.
Following a "Flash Alert" from the FBI, organizations must mitigate the risk posed by dangerous "wiper" malware attacks designed to erase hard drives. Malware expert Roel Schouwenberg offers strategic advice.
In the wake of the FBI issuing a warning that a U.S. business, reportedly Sony Pictures Entertainment, has been attacked using a dangerous form of "wiper" malware, security experts weigh in on the news and offer mitigation advice.
A new report from FireEye about the emergence of cyber-attacks aimed at the accounts of executives at publicly traded corporations for the purpose of "obtaining an edge" in stock trades has raised some questions among financial fraud experts.
The Syrian Electronic Army hacker collective has claimed credit for hacking into an advertising network used by a number of media sites, as well as disrupting access to more than 80 websites.
While security experts are predicting a significant uptick in point-of-sale attacks, as usual, during the holiday shopping season, they say retailers are better prepared to fight fraud because they've beefed up security.
The U.S. Postal Service on Nov. 10 confirmed a data breach that affected some of its information systems. This infographic offers a timeline of the breach investigation provided by an official during a Congressional hearing.
A Russian website is streaming live footage accessed without authorization from cameras around the world. The exposure highlights the dangers of weak passwords and the need for organizations to vet the security settings of all Internet-connected devices.
Retailers cannot avoid innovation. Yet, cybercriminals thrive when retailers innovate. What, then, can retailers do to stop cybercriminals from breaching their defenses? Here are three key questions to answer.
The director of the National Security Agency, Navy Admiral Michael Rogers, says he expects to see adversaries launch a cyber-attack in the next few years aimed at severely damaging America's critical infrastructure.
India's approach to security may be disconnected from the threat reality, says Sivarama Krishnan of PwC. Security budgets are in decline, but the cost of breaches increases. Government must lead by example.
Cybersecurity specialists need to learn to think like an adversary in order to develop sound defense strategies, says Greg Shannon, chief scientist at the CERT Division of Carnegie Mellon University's Software Engineering Institute.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.