House intelligence committee leaders unveiled a bipartisan cyber security bill amid signs of broad agreement on long-sought legislation that would allow private companies to share with the government details of how they are hacked, without fear of being sued.
Insurance Commissioner Mike Kreidler said he plans to work with his counterparts in Alaska and...
A Russian man charged with hacking into U.S. businesses to steal thousands of credit card...
A judge scrapped the Netherlands' data retention law , saying that while it helps solve crimes it also breaches the privacy of telephone and Internet users. The ruling by a judge in The Hague followed a similar decision in April by the European Union's top court that wiped out EU data collection legislation it deemed too broad and offering too few privacy safeguards.
Internet watchdog group Citizen Lab said in a report that hackers who attacked a U.S. employee of Ethiopian Satellite Television in 2013 have recently launched a new round of attacks using upgraded espionage software. Citizen Lab, which is based at the University of Toronto's Munk School of Global Affairs, says the hackers used three booby-trapped emails sent out in November and December.
The Federal Aviation Administration has taken steps to protect the air traffic control system from cyber-based threats, but "significant security control weaknesses remain, threatening the agency's ability to ensure the safe and uninterrupted operation," said a report by the Government Accountability Office.
Whether data is hosted on private servers or in a public cloud, every organization faces a litany of legal liability if they are ever victims of a breach.Experienced business continuity professionals understand that recovering from a data breach is expensive and can cause massive down time. They need to work with their organization's IT/DR staff to prevent them.
Bill Highleyman Managing Editor of Availability Digest, discusses placing trust in the public cloud and how specific examples of cloud failures, some by large and well respected companies, demonstrate that the technology still has a long way to go,
The White House is setting up a new agency designed to coordinate cyber threat intelligence that currently is spread across the U.S. government. Currently, government expertise in analyzing the various cyber threats resides in a number of agencies, including the FBI, the Department of Homeland Security, the National Security Agency and U.S. Cyber Command.
Cloud computing is an increasingly important IT option for organizations of all sizes. There are many different ways of sizing, configuring and implementing cloud based solutions and new security methods are continually evolving. Like every legitimate IT option, there are trade-offs and risks associated with the deployment and continued used of a cloud architecture
Those seemingly harmless medical forms everyone fills out before seeing a doctor can lead to identity theft if they get into the wrong hands. Names, birthdates and — more importantly — Social Security numbers can help hackers open fake credit lines, file false tax returns and create false medical records. And health care businesses can lag far behind banks, credit card companies and retailers in protecting such sensitive information.
Sony Corp. trimmed its forecast of losses and gave a figure for damages from the Sony Pictures hack, but said it would suffer no significant harm from the cyberattack in the long run. The entertainment and electronics giant delayed the announcement of its earnings for the October-December quarter because the hack affected its ability to compile its complete results in time.
The ruling at The Hague District Court clears the way for Vladimir Drinkman to be sent to New Jersey, where he is one of four Russians and a Ukrainian charged in a sophisticated data breach that netted at least 160 million credit and debit card numbers and resulted in losses of hundreds of millions of dollars over seven years.
Federal prosecutors have obtained a third guilty plea involving an international hacking ring that gained access to a U.S. Army computer network while targeting computer giant Microsoft and several video game developers. Authorities say 20-year-old Nathan Leroux of Bowie, Maryland, pleaded guilty to conspiracy to commit computer intrusions and criminal copyright infringement.
A Kenyan official says the government is considering a request by the Chinese government to repatriate some of the 76 Chinese nationals arrested in Kenya for hacking. Police arrested the 76 Chinese nationals and one Taiwanese early December with sophisticated equipment in houses in plush neighborhoods of the city.
President, Obama laid out his plans this week as part of a push for new cybersecurity legislation that increases government information-sharing and protects businesses from lawsuits for revealing cyberthreats. Yet the president's proposals are similar to congressional legislation that has been languishing on Capitol Hill, in part over privacy concerns.
The lawyer for a Russian accused by U.S. authorities of involvement in a huge computer hack that stole and sold at least 160 million credit and debit-card numbers called on a Dutch judge to ban his extradition to the United States. U.S. prosecutors have called the hack the largest data breach scheme ever prosecuted in the United States.
In light of breaches at companies like Home Depot and Target, the president is proposing legislation that would require companies to inform their customers whether their data has been compromised within 30 days called the Personal Data Notification and Protection Act. The act would also make it a crime to sell customers’ identities overseas.
President Barack Obama wants Congress to pass legislation requiring companies to inform customers within 30 days if their data has been hacked, a move that follows high-profile breaches at retailers including Target, Home Depot and Neiman Marcus.
Lori Cunningham, Lead IT Service Management Specialist for Aetna, will present "From Checking-the-Box to Truly Resilient: Case Studies in Disaster Recovery." She will focus on public and private sector case studies that show why having a strong disaster recovery program is important for any organization.
A massive data breach at Sony Pictures Entertainment, which experts believe was targeted by North Korea as retaliation for a film depicting the assassination of its leader Kim Jong Un, has led to an international incident that has gained the attention of business continuity professionals.
South Korea's monopoly nuclear power company said it began drills against possible cyberattacks after online threats of attack against its plants. State-owned Korea Hydro & Nuclear Power Co. said the two-day drills are meant to prepare workers in the event of hacking attacks aimed at disabling the plants' controlling systems.
The unprecedented hack of Sony Pictures which a U.S. official says is linked to North Korea may be the most damaging cyberattack ever inflicted on an American business. The fallout from the hack that exposed a trove of sensitive documents, and this week escalated to threats of terrorism, forced Sony to cancel release of the North Korean spoof movie "The Interview."
Criminals stole personal information from tens of millions of Americans in data breaches this past year. Of those affected, one in three may become victims of identity theft. Americans are mostly at the mercy of companies to keep their sensitive details safe. But there are steps businesses and individuals can take to protect themselves against the financial, legal and emotional impact of identity theft — and most of them are free.
Researchers say they have a wealth of clues — but no clear answers — as to the identity of those behind a series of newly discovered cyberattacks targeting Russian and Eastern European embassies, oil companies and military officers. The malware — nicknamed "Inception" — has been attacking mainly Russian or Eastern European targets in the fields of diplomacy, energy and finance.
North Korea released a statement Sunday that clearly relished a cyberattack on Sony Pictures, which is producing an upcoming film that depicts an assassination plot against Pyongyang's supreme leader. Some cybersecurity experts say they've found striking similarities between the code used in the hack of Sony Pictures Entertainment and attacks blamed on North Korea that targeted South Korean companies and government agencies last year.
Fred Bowne, Managing Principal at Aristata and and Director of the Resilient Technology Collaborative, discusses the goals of the RTC and how they hope to help business continuity professionals solve shared tech challenges from across the industry.
Some cybersecurity experts say it is unlikely North Korea was behind the cyberattack that crippled Sony Pictures' computers and possibly leaked unreleased movies online. Speculation has been rampant that the hard-line communist state sponsored last week's hack in anger over the new Sony movie "The Interview," in which Seth Rogen and James Franco play television journalists assigned by the CIA to assassinate North Korean leader Kim Jong Un.
- Page 1