The Federal Aviation Administration has taken steps to protect the air traffic control system from cyber-based threats, but "significant security control weaknesses remain, threatening the agency's ability to ensure the safe and uninterrupted operation," said a report by the Government Accountability Office.
Phone hacking was "rife" for years at tabloids owned by Britain's Trinity Mirror PLC, a lawyer...
Netherlands-based Gemalto, a maker of SIM cards used in mobile phones and credit cards, said an...
The Mid-Atlantic Disaster Recovery Association (MADRA) hosted an open forum discussion, which...
A suburban Chicago police department paid a hacker a $500 ransom to restore access to data on a police computer that the hacker had disabled through the use of an increasingly popular type of virus. Midlothian Police Chief Harold Kaufman confirmed the department had been hacked, but declined further comment.
The 2015 Continuity Insights Management Conference will feature several presentations from companies representing various industries that will focus on emerging issues. Presenters will cover a wide range of topics that many BC pros will likely be faced with soon if they haven’t been working on them already.
A Russian citizen pleaded not guilty Tuesday to an 11-count indictment charging him and four others with running what authorities have called the largest criminal computer hacking scheme ever prosecuted in the United States. Vladimir Drinkman pleaded not guilty to computer hacking conspiracy, wire fraud conspiracy, several counts of unauthorized computer access and three counts of wire fraud.
Whether data is hosted on private servers or in a public cloud, every organization faces a litany of legal liability if they are ever victims of a breach.Experienced business continuity professionals understand that recovering from a data breach is expensive and can cause massive down time. They need to work with their organization's IT/DR staff to prevent them.
A hacker gang that looted as much as $1 billion worldwide from banks was unusual: It stole directly from the banks, instead of ripping off their customers. Security experts say consumers still need to keep a close eye on their checking and savings, as epic computer breaches such as this theft — documented in a report issued Monday — are becoming all too common.
Bill Highleyman Managing Editor of Availability Digest, discusses placing trust in the public cloud and how specific examples of cloud failures, some by large and well respected companies, demonstrate that the technology still has a long way to go,
The White House is setting up a new agency designed to coordinate cyber threat intelligence that currently is spread across the U.S. government. Currently, government expertise in analyzing the various cyber threats resides in a number of agencies, including the FBI, the Department of Homeland Security, the National Security Agency and U.S. Cyber Command.
Cloud computing is an increasingly important IT option for organizations of all sizes. There are many different ways of sizing, configuring and implementing cloud based solutions and new security methods are continually evolving. Like every legitimate IT option, there are trade-offs and risks associated with the deployment and continued used of a cloud architecture
Automakers are cramming cars with wireless technology, but they have failed to adequately protect those features against the real possibility that hackers could take control of vehicles or steal personal data, according to an analysis of information that manufacturers provided to Democratic Sen. Edward Markey
Those seemingly harmless medical forms everyone fills out before seeing a doctor can lead to identity theft if they get into the wrong hands. Names, birthdates and — more importantly — Social Security numbers can help hackers open fake credit lines, file false tax returns and create false medical records. And health care businesses can lag far behind banks, credit card companies and retailers in protecting such sensitive information.
Health insurer Anthem said hackers infiltrated its computer network and gained access to personal information for "tens of millions" of customers and employees, including CEO Joseph Swedish. The nation's second-largest health insurer said it was contacting customers affected by what it calls a "very sophisticated" cyberattack that the company discovered last week.
Sony Corp. trimmed its forecast of losses and gave a figure for damages from the Sony Pictures hack, but said it would suffer no significant harm from the cyberattack in the long run. The entertainment and electronics giant delayed the announcement of its earnings for the October-December quarter because the hack affected its ability to compile its complete results in time.
The ruling at The Hague District Court clears the way for Vladimir Drinkman to be sent to New Jersey, where he is one of four Russians and a Ukrainian charged in a sophisticated data breach that netted at least 160 million credit and debit card numbers and resulted in losses of hundreds of millions of dollars over seven years.
Today’s businesses lean more on technology then they ever have, which has made information technology and disaster recovery an important part of any business continuity plan. Business continuity and IT professionals must work together more than ever to keep their companies online while maintaining critical business functions.
Hackers defaced the website of Malaysia Airlines and threatened to dump stolen information online after posting a glimpse of customer data obtained in the attack. The airline's site was down for at least seven hours, replaced by a message from the Lizard Squad hacker group, before the company brought it back online by mid-afternoon in Malaysia.
Federal prosecutors have obtained a third guilty plea involving an international hacking ring that gained access to a U.S. Army computer network while targeting computer giant Microsoft and several video game developers. Authorities say 20-year-old Nathan Leroux of Bowie, Maryland, pleaded guilty to conspiracy to commit computer intrusions and criminal copyright infringement.
A Kenyan official says the government is considering a request by the Chinese government to repatriate some of the 76 Chinese nationals arrested in Kenya for hacking. Police arrested the 76 Chinese nationals and one Taiwanese early December with sophisticated equipment in houses in plush neighborhoods of the city.
President, Obama laid out his plans this week as part of a push for new cybersecurity legislation that increases government information-sharing and protects businesses from lawsuits for revealing cyberthreats. Yet the president's proposals are similar to congressional legislation that has been languishing on Capitol Hill, in part over privacy concerns.
The lawyer for a Russian accused by U.S. authorities of involvement in a huge computer hack that stole and sold at least 160 million credit and debit-card numbers called on a Dutch judge to ban his extradition to the United States. U.S. prosecutors have called the hack the largest data breach scheme ever prosecuted in the United States.
In light of breaches at companies like Home Depot and Target, the president is proposing legislation that would require companies to inform their customers whether their data has been compromised within 30 days called the Personal Data Notification and Protection Act. The act would also make it a crime to sell customers’ identities overseas.
Hackers supporting Islamic militants took over the Twitter and YouTube accounts of a major U.S. military command, in what the Pentagon called an annoying prank that did not breach military networks or access classified data. The hacker group, calling itself CyberCaliphate, was already under FBI investigation for incursions into the Twitter feeds or websites of media outlets.
President Barack Obama wants Congress to pass legislation requiring companies to inform customers within 30 days if their data has been hacked, a move that follows high-profile breaches at retailers including Target, Home Depot and Neiman Marcus.
Thieves with stolen usernames and passwords have broken into customer accounts at American and United airlines and in some cases booked free trips or upgrades. The airlines say the incidents happened in late December. American began notifying affected customers by email, a spokeswoman said.
The Obama administration's extraordinary decision to point fingers at North Korea over the hacking of Sony Pictures Entertainment Inc. could lead to a courtroom spectacle in the event charges are ultimately filed against someone without ties to the isolated country, such as a disgruntled employee or an unrelated hacker.
Pete O'Dell discusses how lessons from the Sony hack attack that might motivate boards of directors to start taking proactive measures against attacks that could potentially have much broader scope than having customer data compromised and e-mails leaked.
- Page 1