House intelligence committee leaders unveiled a bipartisan cyber security bill amid signs of broad agreement on long-sought legislation that would allow private companies to share with the government details of how they are hacked, without fear of being sued.
Insurance Commissioner Mike Kreidler said he plans to work with his counterparts in Alaska and...
Amazon.com's video game streaming platform Twitch informed users that their accounts may have...
Common Core testing for thousands of students had to be delayed after computers were hacked at a Colorado school district, officials said. School districts in New Jersey and Florida reported similar problems in recent weeks, as the new, computerized assessment tests developed by several states were administered.
A judge scrapped the Netherlands' data retention law , saying that while it helps solve crimes it also breaches the privacy of telephone and Internet users. The ruling by a judge in The Hague followed a similar decision in April by the European Union's top court that wiped out EU data collection legislation it deemed too broad and offering too few privacy safeguards.
Charges have been dismissed against a National Weather Service employee accused of illegally accessing a restricted federal computer database containing information about the nation's dams, stealing information and lying to investigators.
Computer hackers stole 1 billion email addresses from U.S. marketing companies in what federal authorities called one of the largest reported data breaches in U.S. history. Three people were indicted on federal charges after they allegedly netted $2 million in commissions from millions of spam emails that routed recipients to websites selling software and other products.
Internet watchdog group Citizen Lab said in a report that hackers who attacked a U.S. employee of Ethiopian Satellite Television in 2013 have recently launched a new round of attacks using upgraded espionage software. Citizen Lab, which is based at the University of Toronto's Munk School of Global Affairs, says the hackers used three booby-trapped emails sent out in November and December.
Phone hacking was "rife" for years at tabloids owned by Britain's Trinity Mirror PLC, a lawyer for victims of illegal eavesdropping said. David Sherborne said the Daily Mirror, Sunday Mirror and People tabloids likely began hacking phones "by mid-1999 at the latest." He said it went on for "at least eight and possibly 10 years."
Netherlands-based Gemalto, a maker of SIM cards used in mobile phones and credit cards, said an internal investigation "gives us reasonable grounds to believe" an operation by the U.S. National Security Agency and its British counterpart "probably happened."
A suburban Chicago police department paid a hacker a $500 ransom to restore access to data on a police computer that the hacker had disabled through the use of an increasingly popular type of virus. Midlothian Police Chief Harold Kaufman confirmed the department had been hacked, but declined further comment.
Whether data is hosted on private servers or in a public cloud, every organization faces a litany of legal liability if they are ever victims of a breach.Experienced business continuity professionals understand that recovering from a data breach is expensive and can cause massive down time. They need to work with their organization's IT/DR staff to prevent them.
A hacker gang that looted as much as $1 billion worldwide from banks was unusual: It stole directly from the banks, instead of ripping off their customers. Security experts say consumers still need to keep a close eye on their checking and savings, as epic computer breaches such as this theft — documented in a report issued Monday — are becoming all too common.
Bill Highleyman Managing Editor of Availability Digest, discusses placing trust in the public cloud and how specific examples of cloud failures, some by large and well respected companies, demonstrate that the technology still has a long way to go,
The White House is setting up a new agency designed to coordinate cyber threat intelligence that currently is spread across the U.S. government. Currently, government expertise in analyzing the various cyber threats resides in a number of agencies, including the FBI, the Department of Homeland Security, the National Security Agency and U.S. Cyber Command.
Cloud computing is an increasingly important IT option for organizations of all sizes. There are many different ways of sizing, configuring and implementing cloud based solutions and new security methods are continually evolving. Like every legitimate IT option, there are trade-offs and risks associated with the deployment and continued used of a cloud architecture
Automakers are cramming cars with wireless technology, but they have failed to adequately protect those features against the real possibility that hackers could take control of vehicles or steal personal data, according to an analysis of information that manufacturers provided to Democratic Sen. Edward Markey
Those seemingly harmless medical forms everyone fills out before seeing a doctor can lead to identity theft if they get into the wrong hands. Names, birthdates and — more importantly — Social Security numbers can help hackers open fake credit lines, file false tax returns and create false medical records. And health care businesses can lag far behind banks, credit card companies and retailers in protecting such sensitive information.
Health insurer Anthem said hackers infiltrated its computer network and gained access to personal information for "tens of millions" of customers and employees, including CEO Joseph Swedish. The nation's second-largest health insurer said it was contacting customers affected by what it calls a "very sophisticated" cyberattack that the company discovered last week.
Sony Corp. trimmed its forecast of losses and gave a figure for damages from the Sony Pictures hack, but said it would suffer no significant harm from the cyberattack in the long run. The entertainment and electronics giant delayed the announcement of its earnings for the October-December quarter because the hack affected its ability to compile its complete results in time.
The ruling at The Hague District Court clears the way for Vladimir Drinkman to be sent to New Jersey, where he is one of four Russians and a Ukrainian charged in a sophisticated data breach that netted at least 160 million credit and debit card numbers and resulted in losses of hundreds of millions of dollars over seven years.
Hackers defaced the website of Malaysia Airlines and threatened to dump stolen information online after posting a glimpse of customer data obtained in the attack. The airline's site was down for at least seven hours, replaced by a message from the Lizard Squad hacker group, before the company brought it back online by mid-afternoon in Malaysia.
Federal prosecutors have obtained a third guilty plea involving an international hacking ring that gained access to a U.S. Army computer network while targeting computer giant Microsoft and several video game developers. Authorities say 20-year-old Nathan Leroux of Bowie, Maryland, pleaded guilty to conspiracy to commit computer intrusions and criminal copyright infringement.
A Kenyan official says the government is considering a request by the Chinese government to repatriate some of the 76 Chinese nationals arrested in Kenya for hacking. Police arrested the 76 Chinese nationals and one Taiwanese early December with sophisticated equipment in houses in plush neighborhoods of the city.
President, Obama laid out his plans this week as part of a push for new cybersecurity legislation that increases government information-sharing and protects businesses from lawsuits for revealing cyberthreats. Yet the president's proposals are similar to congressional legislation that has been languishing on Capitol Hill, in part over privacy concerns.
The lawyer for a Russian accused by U.S. authorities of involvement in a huge computer hack that stole and sold at least 160 million credit and debit-card numbers called on a Dutch judge to ban his extradition to the United States. U.S. prosecutors have called the hack the largest data breach scheme ever prosecuted in the United States.
In light of breaches at companies like Home Depot and Target, the president is proposing legislation that would require companies to inform their customers whether their data has been compromised within 30 days called the Personal Data Notification and Protection Act. The act would also make it a crime to sell customers’ identities overseas.
President Barack Obama wants Congress to pass legislation requiring companies to inform customers within 30 days if their data has been hacked, a move that follows high-profile breaches at retailers including Target, Home Depot and Neiman Marcus.
- Page 1