Justice Department officials are seeking a tougher law to combat overseas credit card trafficking, an increasingly lucrative crime that crosses national boundaries. Authorities say the current statute is too weak because it allows people in other countries to avoid prosecution if they stay outside the United States when buying and selling the data and don't pass their illicit business through the U.S.
The federal Office of Personnel Management plans...
The boundary between the online and physical...
Ken Simpson discusses the importance of the "cyber supply chain" in preparing for cyber threats and how business continuity and logistics can go hand-in-hand for organizations looking to prevent such threats. He also discusses sharing the critical cyber threats with senior management.
The grocery chain Supervalu said Friday that it may have suffered a data breach at stores in as many as five states. Hackers accessed a network that processes store transactions. Account numbers, expiration dates, cardholders' names and other information may have been stolen, the company said.
Dr. Bill Highleyman, Managing Editor of the Availability Digest, will be presenting a paper on Distributed Denial of Service (DDoS) attacks at the Continuity Insight’s Regional Business Continuity Conference to be held at the Wyndham Hotel in New York City on October 7 and 8, 2014.
Patented seed allegedly stolen from U.S. seed corn companies as part of what prosecutors say was a conspiracy involving seven employees of a Chinese agriculture biotechnology company to steal trade secrets could be worth as much as $500 million, federal prosecutors said last week.
An international law enforcement operation has struck a major blow against the gang behind Shylock, one of the world’s most dangerous financial Trojans. The takedown, which was led by the UK National Crime Agency, resulted in the seizure of a command and control (C&C) servers, in addition to domains that Shylock uses for communication between infected computers.
Nearly 23 million private records of New Yorkers have been exposed in data security breaches reported by more than 3,000 businesses, nonprofits and governments over the past eight years. Deliberate hacking was responsible for 40 percent of the 5,000 incidents.
Authorities say a 30-year old Russian man recently arrested on bank fraud and other charges was also found to have hacked into computers at restaurants in Western Washington, hundreds of other retail businesses and even the Phoenix Zoo.
Steve Ross, Executive Principal for Riskmasters Inc., discusses the importance of being prepared for interruptions caused by cyber attacks and why business continuity professionals should put more effort into planning for such attacks
German Chancellor Angela Merkel criticized industrial spying Monday while on a visit to China, which Germany and other governments have cited as a global center for economic espionage. The United States and other governments complain China's military, a leader in cyber warfare, steals foreign trade secrets to help the country's vast state-owned industrial sector.
The Houston Astros said Monday that they have been the victims of hackers who accessed their servers and published months of internal trade talks on the Internet. The team is working with the FBI and Major League Baseball security to try who was responsible for the breach.
A global fraud study of more than 6,100 consumers across 20 countries revealed that one in four consumers is a victim of card fraud in the last five years. Nearly 25 percent of consumers changed financial institutions due to dissatisfaction after experiencing fraud.
The United States will urge China to resume discussions on cyber security that were abruptly suspended after the Americans charged five Chinese military officers with hacking into U.S. companies to steal trade secrets. After the indictments against the five officers were unsealed in May, Beijing pulled the plug on the group that had been set up a year ago in what Washington.
Target Corp. said a glitch in its system caused delays at checkout registers at some of its U.S. stores but it wasn't due to a data security issue or a hacker. Customers across the country took to social media to report long check-out lines Sunday night due to registers not working.
Avalution Consulting – a leading provider of business continuity consulting and software solutions – announced today the release of the Business Continuity Management (BCM) 101 educational video series. The six videos in BCM 101 provide straightforward answers to the most common business continuity-related questions
A band of hackers implanted viruses on hundreds of thousands of computers around the world, secretly seized customer bank information and stole more than $100 million from businesses and consumers, the Justice Department said Monday in announcing charges against the Russian man accused of masterminding the effort.
The report by China's Internet Media Research Center, cited Tuesday by the official Xinhua News Agency, mentioned media reports of former NSA contractor Edward Snowden's leaks and said a subsequent investigation by Chinese authorities "confirmed the existence of snooping activities directed against China."
"The ruling has significant implications for how we handle takedown requests," Google spokesman Al Verney said. "This is logistically complicated, not least because of the many languages involved and the need for careful review. As soon as we have thought through exactly how this will work, which may take several weeks, we will let our users know."
An admitted computer hacker who helped the FBI thwart hundreds of cyberattacks on government and corporate computer systems will be freed from prison. Hector Xavier Monsegur (HAH'-vee-ehr MAHN'-see-gur) was sentenced Tuesday in Manhattan to the time he already served — seven months.
The hackers targeted big-name makers of nuclear and solar technology, stealing confidential business information, sensitive trade secrets and internal communications for competitive advantage, according to a grand jury indictment. "Success in the international marketplace should be based solely on a company's...
SanDisk Corporation (NASDAQ: SNDK ), a global leader in flash storage solutions, today announced the inaugural members of its broad ecosystem of independent software vendors (ISV) for security management. This unique ecosystem provides SanDisk customers with fully certified solutions to ease the deployment...
The survey, commissioned by Red Hat through CIO Strategic Marketing Services /IDG Research Services polled 100 respondents at the IT director level and above at organizations with 1,000 or more employees about the current and future roles of CIOs.
Gregg Steinhafel, who was also president and chairman, stepped down nearly five months after Target disclosed a huge pre-Christmas breach in which hackers stole millions of customers' credit- and debit-card records. The theft badly damaged the store chain's reputation and profits.
The 2014 BCI North America Awards, held during the DRJ Spring World Welcome Reception, span 10 categories and recognize the outstanding contribution of business continuity professionals and organizations living in or operating in North America. Winners were chosen by a panel of BCI-appointed judges.
People who have accounts on the enrollment website for President Barack Obama's signature health care law are being told to change their passwords following an administration-wide review of the government's vulnerability to the confounding Heartbleed Internet security flaw.
Security is harder to maintain than it was a year ago according to a study done by KnowBe4. Ransomware, rapid technology advances and adoption of BYOD create a greater challenge for businesses to stay abreast of the numerous internal and external threats.
- Page 1