Internet of things security takeaway: Save yourself, and by doing so, maybe help save the rest of us too. That's the obvious takeaway from the rise of low-tech, high-impact Mirai malware, which has been tied to the record-setting Oct. 21 DDoS attack against Dyn.
There are two Yahoo conspiracy theories: It was hacked by a "state-sponsored actor," and it disabled email forwarding to prevent a post-breach exodus. Although neither scenario appears to be true, that doesn't mean the badly breached search giant is in the clear.
Former NSA contractor Harold T. Martin III., who is accused of pilfering mass quantities of highly classified information, will remain in jail until his trial. Martin engaged in "a course of felonious conduct that is breathtaking in its longevity and scale," prosecutors say.
An NSA contractor who worked for Booz Allen Hamilton has been accused of stealing top-secret documents that the U.S. says could endanger national security. The documents are critical to a "wide variety of national security issues," the Department of Justice says.
The handling of a recent data breach - the details of which are still unfolding - by Oakland, Calif.-based web services company Regpack provides a look into how the discovery and disclosure of a breach can turn into a real train wreck.
Wells Fargo will pay $185 million in fines over employees illegally subscribing customers to banking products they didn't request - creating 2 million ghost accounts in the process - in what appears to be one of the largest cases of identity theft ever recorded.
Bank of the West's new approach to the insider threat is focused less on detection, more on preventing fraud in the first place. David Pollino tells why a "noisy" insider fraud program is more effective than covertly monitoring employee activity.
Hyderabad-based Shriram Life Insurance is alleged to have suffered a huge breach involving over 50 GB of critical data, including customer information. The reported attackers threatened to sell the data for 50 bitcoins.
Security leaders say data science is becoming the building block of contemporary security solutions, showing great promise for developing necessary cyber defences. But where and how is data science best deployed?
A report that the Russian government hacked into Democratic National Committee systems has security experts warning that just because malware was found on a hacked network, that doesn't mean a specific individual, group or nation-state was involved.
As insider channels increasingly become the vector through which attackers gain unauthorized access to data, organizations must look at context-aware security to understand user behavior and prevent data leak, says Naveen Gurusiddaiah of Micro Focus.