Advertisement
 
Information Security
Subscribe to Information Security

The Lead

New Cyber Security Bill Could be Coming Soon

March 25, 2015 4:21 pm | by Ken Dilanian, Associated Press | News | Comments

House intelligence committee leaders unveiled a bipartisan cyber security bill  amid signs of broad agreement on long-sought legislation that would allow private companies to share with the government details of how they are hacked, without fear of being sued.

Washington Announces Investigation Into Premera Cyber Attack

March 25, 2015 2:51 pm | by Derrick Nunnally, Associated Press | News | Comments

Insurance Commissioner Mike Kreidler said he plans to work with his counterparts in Alaska and...

Twitch Users' Accounts Hacked

March 25, 2015 2:19 pm | by Associated Press | News | Comments

 Amazon.com's video game streaming platform Twitch informed users that their accounts may have...

Hacker Must Disclose Assets to Federal Judge

March 23, 2015 10:19 am | by Martha Bellisle, Associated Press | News | Comments

A Russian man charged with hacking into U.S. businesses to steal thousands of credit card...

View Sample

FREE Email Newsletter

Weekly news and features for business continuity professionals

Testing Delayed After School Computers Were Hacked

March 23, 2015 9:54 am | by Associated Press | News | Comments

Common Core testing for thousands of students had to be delayed after computers were hacked at a Colorado school district, officials said.  School districts in New Jersey and Florida reported similar problems in recent weeks, as the new, computerized assessment tests developed by several states were administered.

Social Security Data Error Raises Red Flags

March 16, 2015 3:36 pm | by Stephen Ohlemacher, Associated Press | News | Comments

Americans are getting older, but not this old: Social Security records show that 6.5 million people in the U.S. have reached the ripe old age of 112.  Social Security does not have death records for millions of these people, with the oldest born in 1869, according to a report by the agency's inspector general.

Dutch Judge Scraps Data Retention Law

March 12, 2015 10:59 am | by Associated Press | News | Comments

 A judge scrapped the Netherlands' data retention law , saying that while it helps solve crimes it also breaches the privacy of telephone and Internet users.  The ruling by a judge in The Hague followed a similar decision in April by the European Union's top court that wiped out EU data collection legislation it deemed too broad and offering too few privacy safeguards.

Advertisement

Hacking Charges Against National Weather Service Employee Dropped

March 12, 2015 10:37 am | by Associated Press | News | Comments

Charges have been dismissed against a National Weather Service employee accused of illegally accessing a restricted federal computer database containing information about the nation's dams, stealing information and lying to investigators.

Hackers Steal One Billion E-Mail Addresses

March 9, 2015 4:25 pm | by Russ Bynum, Associated Press | News | Comments

Computer hackers stole 1 billion email addresses from U.S. marketing companies in what federal authorities called one of the largest reported data breaches in U.S. history.  Three people were indicted on federal charges after they allegedly netted $2 million in commissions from millions of spam emails that routed recipients to websites selling software and other products.

Journalist Once Again Targeted by Hackers

March 9, 2015 4:16 pm | News | Comments

Internet watchdog group Citizen Lab said in a report  that hackers who attacked a U.S. employee of Ethiopian Satellite Television in 2013 have recently launched a new round of attacks using upgraded espionage software.  Citizen Lab, which is based at the University of Toronto's Munk School of Global Affairs, says the hackers used three booby-trapped emails sent out in November and December.

Air Traffic Control System at Risk of Being Hacked

March 4, 2015 4:16 pm | by Joan Lowy, Associated Press | News | Comments

The Federal Aviation Administration has taken steps to protect the air traffic control system from cyber-based threats, but "significant security control weaknesses remain, threatening the agency's ability to ensure the safe and uninterrupted operation," said a report by the Government Accountability Office.

Phone Hacking Rampant at British Tabloids

March 4, 2015 3:34 pm | by Associated Press | News | Comments

Phone hacking was "rife" for years at tabloids owned by Britain's Trinity Mirror PLC, a lawyer for victims of illegal eavesdropping said.  David Sherborne said the Daily Mirror, Sunday Mirror and People tabloids likely began hacking phones "by mid-1999 at the latest." He said it went on for "at least eight and possibly 10 years."

Advertisement

Dutch SIM Card Company Allegedly Targeted by British, U.S. Agencies

February 26, 2015 8:15 am | by Associated Press | News | Comments

Netherlands-based Gemalto, a maker of SIM cards used in mobile phones and credit cards, said an internal investigation "gives us reasonable grounds to believe" an operation by the U.S. National Security Agency and its British counterpart "probably happened."

Employee Safety, Data Breaches Were Key Topics at MADRA Meeting

February 24, 2015 12:04 pm | by Joe Shust, Editor | Articles | Comments

The Mid-Atlantic Disaster Recovery Association (MADRA) hosted an open forum discussion, which focused on several key aspects of business continuity, on Thursday, Feb. 19.  The event focused on several critical business continuity topics.

Chicago Area Police Department Pays Hacker $500 Ransom

February 23, 2015 4:17 pm | by Associated Press | News | Comments

A suburban Chicago police department paid a hacker a $500 ransom to restore access to data on a police computer that the hacker had disabled through the use of an increasingly popular type of virus.  Midlothian Police Chief Harold Kaufman confirmed the department had been hacked, but declined further comment.

BC Pros Should be Aware of Emerging Issues

February 18, 2015 3:41 pm | by Joe Shust, Editor | Articles | Comments

The 2015 Continuity Insights Management Conference will feature several presentations from companies representing various industries that will focus on emerging issues.  Presenters will cover a wide range of topics that many BC pros will likely be faced with soon if they haven’t been working on them already.

Drinkman Pleads Not Guilty in Computer Hacking Scheme

February 18, 2015 2:35 pm | by David Porter, Associated Press | News | Comments

 A Russian citizen pleaded not guilty Tuesday to an 11-count indictment charging him and four others with running what authorities have called the largest criminal computer hacking scheme ever prosecuted in the United States.  Vladimir Drinkman pleaded not guilty to computer hacking conspiracy, wire fraud conspiracy, several counts of unauthorized computer access and three counts of wire fraud.

Advertisement

Getting Hacked Could Have Legal Repercussions

February 17, 2015 11:54 am | by Joe Shust, Editor | Articles | Comments

Whether data is hosted on private servers or in a public cloud, every organization faces a litany of legal liability if they are ever victims of a breach.Experienced business continuity professionals understand that recovering from a data breach is expensive and can cause massive down time. They need to work with their organization's IT/DR staff to prevent them.

Security Experts Urge Caution as Cyber Bank Thefts Become More Common

February 17, 2015 11:47 am | by Josh Boak, Associated Press | News | Comments

A hacker gang that looted as much as $1 billion worldwide from banks was unusual: It stole directly from the banks, instead of ripping off their customers.  Security experts say consumers still need to keep a close eye on their checking and savings, as epic computer breaches such as this theft — documented in a report issued Monday — are becoming all too common.

Can You Trust Your Public Cloud?

February 12, 2015 11:11 am | by Bill Highleyman, Managing Editor, Availability Digest | Blogs | Comments

Bill Highleyman Managing Editor of Availability Digest, discusses placing trust in the public cloud and how specific examples of cloud failures, some by large and well respected companies, demonstrate that the technology still has a long way to go,

New Agency Would Coordinate U.S. Cyber Threat Intelligence

February 12, 2015 10:28 am | by Ken Dilanian, Associated Press | News | Comments

The White House is setting up a new agency designed to coordinate cyber threat intelligence that currently is spread across the U.S. government.  Currently, government expertise in analyzing the various cyber threats resides in a number of agencies, including the FBI, the Department of Homeland Security, the National Security Agency and U.S. Cyber Command.

Cloud Risk – Chance of Showers

February 10, 2015 11:41 am | by Pete O'Dell | Articles | Comments

Cloud computing is an increasingly important IT option for organizations of all sizes.  There are many different ways of sizing, configuring and implementing cloud based solutions and new security methods are continually evolving. Like every legitimate IT option, there are trade-offs and risks associated with the deployment and continued used of a cloud architecture

Wireless Technology in Cars Difficult to Protect Against Cyber Threats

February 9, 2015 4:31 pm | by Joan Lowy, Associated Press | News | Comments

 Automakers are cramming cars with wireless technology, but they have failed to adequately protect those features against the real possibility that hackers could take control of vehicles or steal personal data, according to an analysis of information that manufacturers provided to  Democratic Sen. Edward Markey

Health Care Records a Prime Target for Hackers

February 9, 2015 4:09 pm | by Tom Murphy and Brandon Bailey, Associated Press | News | Comments

Those seemingly harmless medical forms everyone fills out before seeing a doctor can lead to identity theft if they get into the wrong hands.  Names, birthdates and — more importantly — Social Security numbers can help hackers open fake credit lines, file false tax returns and create false medical records. And health care businesses can lag far behind banks, credit card companies and retailers in protecting such sensitive information. 

Hackers Hit Anthem, Gain Access to Names, Addresses, Social Security Numbers

February 5, 2015 11:20 am | by Tom Murphy, Associated Press | News | Comments

Health insurer Anthem said hackers infiltrated its computer network and gained access to personal information for "tens of millions" of customers and employees, including CEO Joseph Swedish.  The nation's second-largest health insurer said it was contacting customers affected by what it calls a "very sophisticated" cyberattack that the company discovered last week.

Sony Says it Will Not Suffer Significant Long Term Damage from Hack

February 5, 2015 10:51 am | by Elaine Kurtenbach, Associated Press | News | Comments

Sony Corp. trimmed its forecast of losses and gave a figure for damages from the Sony Pictures hack, but said it would suffer no significant harm from the cyberattack in the long run. The entertainment and electronics giant delayed the announcement of its earnings for the October-December quarter because the hack affected its ability to compile its complete results in time.

Dutch Judge Approves Extradition Request for Russian Hacker

January 29, 2015 10:56 am | by Mike Corder, Associated Press | News | Comments

The ruling at The Hague District Court clears the way for Vladimir Drinkman to be sent to New Jersey, where he is one of four Russians and a Ukrainian charged in a sophisticated data breach that netted at least 160 million credit and debit card numbers and resulted in losses of hundreds of millions of dollars over seven years.

Relevant IT/DR Strategies a Necessity for Today's Business Continuity Pro

January 26, 2015 11:52 am | by Joe Shust, Editor | Articles | Comments

Today’s businesses lean more on technology then they ever have, which has made information technology and disaster recovery an important part of any business continuity plan. Business continuity and IT professionals must work together more than ever to keep their companies online while maintaining critical business functions.  

Hackers Target Malaysia Airlines, Threaten to Release Customer Information

January 26, 2015 11:01 am | by Associated Press | News | Comments

Hackers defaced the website of Malaysia Airlines and threatened to dump stolen information online after posting a glimpse of customer data obtained in the attack.  The airline's site was down for at least seven hours, replaced by a message from the Lizard Squad hacker group, before the company brought it back online by mid-afternoon in Malaysia.

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading