Home Depot's third-quarter profit rose 14 percent, suggesting that a huge data breach announced exactly two months ago has not shaken the faith of its customers. The nation's biggest home improvement retailer stuck to its outlook for all of 2014, but said that it could not account for all possible losses from a data breach it revealed in September that affected 56 million debit and credit cards.
Computer hackers have attacked the website of...
Hybrid clouds are making it possible for...
The State Department has taken the unprecedented step...
Jeff Reinke and Bridget Bergin of Manufacturing.net discuss cyber attacks and how an overwhelming number of those attacks start internally. Topics covered include fog computing, security within a network’s infrastructure, and the open source nature of IoT.
Citigroup, JPMorgan Chase, Royal Bank of Scotland, HSBC Bank and UBS agreed to settlements totaling almost $3.4 billion with the U.S. Commodity Futures Trading Commission, U.K. Financial Conduct Authority and Swiss Financial Market Supervisory Authority. The British regulator said Barclays remains under investigation.
Hackers from China were able to breach government computer systems at the agency that oversees the National Weather Service, according to the chairman of a Congressional subcommittee that oversees the National Oceanic and Atmospheric Agency's budget.
Buffeted by persistent cyberattacks, Tibetan monks are giving new meaning to their ancient creed: Detach from attachments. The Internet safety slogan, one of several messages championed by digital security group Tibet Action Institute, is an example of how human rights defenders are seeking creative ways to protect activists from electronic espionage.
A hacktivist for more than a decade, Hammond, 29, was arrested in 2012 after penetrating the U.S.-based security think tank Stratfor, whose clients include the U.S. Department of Homeland Security and the Defense Department. He'd been working with a subgroup of the loose-knit hacking movement "Anonymous" when a member of the group enlisted him to help break into Stratfor's systems.
A $10 billion-a-year effort to protect sensitive government data, from military secrets to Social Security identification numbers, is struggling to keep pace with an increasing number of cyberattacks and is unwittingly being undermined by federal employees and contractors.
Welcome to the "dark Web," an increasingly popular corner of the Internet where thousands of computer users from around the globe interact anonymously — and, in many cases, illegally. The reach and anonymity of these 21st century Internet operations is difficult to penetrate.
John Tempesco, Senior Director of Marketing at AtHoc, Inc, discusses how many organizations "stovepipe" crisis communications, why that is harmful to those organizations and how to create an emergency notification plan that reaches across an entire business.
Officials say HealthCare.gov has gotten cybersecurity upgrades ahead of a Nov. 15 start for the second open enrollment season under President Barack Obama's health care law. Last year's chaotic debut of the program did not allow time to complete security testing.
A former journalist with British tabloid the Sunday Mirror has pleaded guilty to hacking into voicemails in pursuit of an exclusive story. Graham Johnson admitted guilt Thursday and will be sentenced Nov. 27. The 46-year-old had turned himself in to police after learning of the arrest of colleagues on similar charges.
The Dutch government has approved the extradition to the United States of a Russian citizen accused of participating in a hacking ring that penetrated computer networks of more than a dozen corporations and stole at least 160 million credit and debit card numbers.
Michael Chaly and Michael Dunn of Lootok discuss how data breaches, even those at other organizations, can effect your company. They discuss how cyber crime has a "ripple effect" and how effective business continuity planning can prevent attacks.
A cyberattack similar to previous hacker intrusions from China penetrated computer networks for months at USIS, the government's leading security clearance contractor, before the company noticed, officials and others familiar with an FBI investigation and related official inquiries said.
Continuity Insights and Dell hosted their webinar, “Dealing with Disasters at Dell,” which discussed lessons learned and disaster recovery at the computer company, on Thursday, Oct. 30. The free webinar is available here for those who were unable to attend.
A Danish court has sentenced the Swedish founder of file-sharing site The Pirate Bay to 3½ years in prison after he was found guilty of hacking into a private company handling sensitive information for Danish authorities, including social security numbers, driver's license numbers and police records of sought-after people in Europe.
Dr. Bill Highleyman, Managing Editor of Availability Digest, discusses Distributed Denial of Service (DDoS) attacks, including botnets, various attack strategies and how they can impact an organization. This is part two ina a two part series on DDoS attacks.
Two phone companies — TerraCom Inc. and YourTel America Inc. — unwittingly posted the Social Security numbers, driver's licenses and other sensitive data of up to 300,000 clients to the Internet, an investigation found, and federal regulators said they plan to fine the companies.
An Estonian national who pleaded guilty to orchestrating a 2008 cyberattack on a credit card processing company that enabled hackers to steal $9.4 million from ATMs around the world was sentenced to 11 years in prison and ordered to repay most of the money, prosecutors said.
Dell and Continuity Insights' webinar "Dealing With Disasters at Dell: Lessons Learned and Solutions Found," will take place Thursday, Oct. 30. The webinar was originally scheduled for Tuesday, Oct. 28. Those interested in signing up for the free webinar may do so here.
Dr. Bill Highleyman, Managing Editor of Availability Digest, discusses Distributed Denial of Service (DDoS) attacks, including botnets, various attack strategies and how they can impact an organization. This is part one of a two part series on DDoS attacks.
Data breaches, both large and small, are of great concern to business continuity professionals today. This year saw several high profile businesses have their data – and their customer’s data – compromised by information leaks. Here are the top five data breaches we have seen so far in 2014.
Apple has posted a new security warning for users of its iCloud online storage service amid reports of a concerted effort to steal passwords and other data from people who use the popular service in China. The company suggested users should verify they are connecting to a legitimate iCloud server by using the security features built into Safari and other browsers such as Firefox and Google's Chrome.
Saying more must be done to stop data breaches affecting consumers, President Barack Obama announced a government plan to tighten security for the debit cards that transmit federal benefits like Social Security to millions of Americans.
A Massachusetts man who was part of an international cybercrime ring that the government says hacked into the computers of more than a dozen financial institutions and the U.S. military's payroll service was sentenced Friday to 2½ years in prison.
After an avalanche of data breaches, South Korea's national identity card system has been raided so thoroughly by thieves that the government says it might have to issue new ID numbers to every citizen over 17 at a possible cost of billions of dollars.
- Page 1