FireEye has confirmed that one of its Mandiant breach investigation employee's personal laptops was breached by hackers, and corporate data dumped. The hackers say the leak is the first in a series of "Operation LeakTheAnalyst" attacks against cybersecurity researchers.
The purported hacking of computers of French presidential candidate Emmanuel Macron, by the same Russian group that targeted Hillary Clinton's campaign, signifies an expansion of the goals of the attackers that extend beyond trying to influence the outcome of Western elections.
Twitter has dropped a federal lawsuit that sought to quash an administrative summons, which the government subsequently withdrew, seeking records for an account that's critical of U.S. policy. It's one of many accounts suspected to have been created by disgruntled government employees.
Facebook is aiming to make account recovery and password resets more secure with a new, updated approach that eliminates outdated weaknesses such as emailed reset links, SMS messages and security questions.
Facebook says it hasn't seen ransomware spreading through its Messenger instant messaging platform despite recent reports from researchers saying that the file-encrypting Locky may have slipped through.
Thank Mark Zuckerberg's taped-over webcam and the Paris robbery of Kim Kardashian West for waking up the average consumer to the security risks they face from using technology and social media, social engineering expert Sharon Conheady says in this audio interview.
India has just woken to a massive breach long anticipated by pragmatic observers in the industry. However, ironically, no responsibility can be pinned. Individual banks are all claiming innocence, and the regulator is MIA.
Authorities say Yevgeniy Aleksandrovich Nikulin stole credentials from a LinkedIn employee and used them to breach the social networking firm in 2012, in which well over 100 million members' passwords were exposed.
The breach of porn site Brazzers - which allows users to swap fantasies in online forums - begs the question of how many users employed throwaway usernames and passwords. Some 1,446 U.S. military and 41 U.S. government email addresses were found in the data dump.
Swindlers trolling social media sites for customers' personally identifiable information play a critical role in facilitating banking fraud, says American Bankers Association economist Jane Yao.
At the Black Hat event in Las Vegas later this month, researchers plan to reveal vulnerabilities in hooking engines, a critical component of security software and other applications, including Microsoft Office.
In the wake of a majority of British voters opting to leave the European Union, the U.K. Information Commissioner's Office argues that the country should still comply with the EU's data privacy rules. But will politics get in the way?
India's National Cyber Security Coordinator, Dr. Gulshan Rai, puts forth a five-point agenda to secure digital India. Critics question what's new and different about the plan and suggest what they see as the right steps to security.
IBM's Vaidyanathan Iyer says security practitioners need new tactics to bridge the skills gap and fight emerging threats. He suggests the use of analytics and machine learning would easily help fill the gap in detecting threats.
A new report from researchers at RSA describes how cybercriminals are using social media, including Facebook, to not only network about their attacks, but also sell card data and other compromised consumer information. Daniel Cohen of RSA FraudAction describes the report in this video interview.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.