Why 2017 will be the worst year ever for security

Sony. Anthem. The Office of Personnel Management. Target. Yahoo. The past two years have seen one mega-breach after another—and 2017 promises to be the most catastrophic year yet. Security experts have long warned that most organizations don’t even know they’ve been...

Austria’s FACC, hit by cyber fraud, fires CEO

The head of Austrian aerospace parts maker FACC has been fired after the company was hit by a cyber fraud that cost it 42 million euros ($47 million). The firm's supervisory board decided at a 14-hour meeting on Tuesday to dismiss CEO Walter Stephan with "immediate...

Ransomware demands are working, fueling an increase in attacks

Emboldened by the wave of successful ransomware attacks in early 2016, more cybercriminals are rushing to take advantage of this lucrative crime spree. Monitoring in the age of devops A combination of cultural transformation and automation is redefining the way...

How Fortune got inside the Sony hack

What Peter Elkind found in his six-month investigation of the cybercrime of the century should terrify corporate America. We have devoted 12,000 words in our July 1 issue to an extraordinary story by Peter Elkind on the now infamous cyber­attack against Sony Corp.,...

Millions of hacked LinkedIn IDs advertised ‘for sale’

A hacker is advertising what he says is more than one hundred million LinkedIn logins for sale.The IDs were reportedly sourced from a breach four years ago, which had previously been thought to have included a fraction of that number.At the time, the business-focused...

Survey: 90% of businesses hacked at least once in 2015

For risk managers — indeed for most businesses — among the most disturbing words they can hear are “We’ve been hacked.” What was once something to fear for only large businesses is now an issue for the majority, according to a survey of business risk managers released...

Cybersecurity Breaches Hit Nearly Three in Four Organizations

Nearly three out of four organizations have been plagued by at least one security breach or incident in the past year, with about 60 percent of breaches categorized as serious, according to a new report by CompTIA. The International Trends in Cybersecurity report also...

Cyber insurance can keep your business afloat after a cyberattack

Technology, social media and transactions over the Internet play key roles in how most organizations conduct business and reach out to prospective customers today. Those vehicles also serve as gateways to cyberattacks. Whether launched by run-of-the-mill hackers,...

Building a brand-new Internet

We do not possess the ability to read the future, and yet we can predict with a high level of certainty that we will see more major cybersecurity incidents in 2016 and 2017. The world’s cybersecurity capability is not able to advance in line with the growing...

The two misconceptions dominating the encryption debate

Cybersecurity is a massive challenge affecting everyone –- startups, government, corporate systems and consumers, costing the global economy billions of dollars annually. Tragically, the one solution we are seriously considering — mandating encryption backdoors — will...

Seagate Phish Exposes All Employee W-2’s

Email scam artists last week tricked an employee at data storage giant Seagate Technology into giving away W-2 tax documents on all current and past employees, KrebsOnSecurity has learned. W-2 forms contain employee Social Security numbers, salaries and other personal...

Hackers Target Anti-DDoS Firm Staminus

Staminus Communications Inc., a California-based Internet hosting provider that specializes in protecting customers from massive “distributed denial of service” (DDoS) attacks aimed at knocking sites offline, has itself apparently been massively hacked. Staminus’s...

The Tsunami in 2016 that is NIST (SP) 800-171

2015 was the year of the hacker. There is no segment that was left un-scathed from breaches, attacks, or disruption. Dozens of hospital patient record databases were breached, multiple fortune X corporation’s customer data exposed, and anyone who holds or has held a...

Rob Enderle – Product of the Week

The "Enigma" name comes from an encryption machine Germany developed and used very successfully in the Second World War, until Alan Turing helped crack it. Turing -- who arguably was key to winning the war for the Allies and then, as a twisted thank you, effectively...

Secure your data; you never know who’s looking

By now, it should be abundantly clear that our data is not secure.  Over the past 15 years, we’ve seen an exponential increase in organized, methodical cyber-related attacks to steal confidential data, assume identities, drain bank accounts and plunder consumer and...

Did TalkTalk breach the Data Protection Act?

On Wednesday, online criminals decided to attack the UK broadband provider TalkTalk. This wasn’t an attack aimed at interrupting its ability to do business or provide its services, this was an attack the goal of which seemed to be accessing the personal data of its...