Speculation surrounding the cause of the disappearance of Malaysia Airlines Flight 370 hasn't included the possibility of a cyber-attack. But one cybersecurity expert contends hacking an airliner is feasible.
In a preliminary step toward enactment of a new EU data protection law, the European Parliament on March 12 approved a draft proposal for a comprehensive overhaul of the EU's 1995 data protection directive.
The EC-Council, which offers certifications and training programs for information security practitioners, is recovering from what it describes as a DNS poisoning attack after its domain registrar was compromised.
Congress heard testimony from cybersecurity experts this week about the steps that should be taken to minimize the risk of breaches of the payments system. Learn what Troy Leach of the PCI Council and others had to say.
In the wake of its data breach last year, Target Corp. is overhauling its information security and compliance practices, launching a search for a new CIO and creating the position of chief information security officer.
In a keynote address at the RSA 2014 Conference, Kevin Mandia, founder of Mandiant, warns organizations to beware of "victim's fatigue," or letting your guard down after going six months without a breach.
Fraudsters continually find new ways to attack, but too many organizations rely on old, unsuccessful methods to detect and prevent fraud. This is the premise, says David Mattos, VP Sales, with Easy Solutions.
Verizon isn't offering many details about two retailer breaches it's reportedly investigating, which may be linked to the Target breach. But IntelCrawler's Dan Clements says the merchants were likely breached several weeks ago.