When it comes to health data breaches, hospitals, doctors offices and even insurance companies are oftentimes the culprits.
Researchers detected nearly 1,000 phishing attempts hitting at least 131 universities in 16 countries over the last year. Cyber-criminals are targeting users with fraudulent web pages designed to look identical to the university’s official page.
Phishing works more frequently on those who understand what social engineering is than on those who live in blissful ignorance, or so a study of students at University of Maryland, Baltimore County suggests.
It's been well understood that cyber-attacks can have numerous negative impacts. However, this is the first time there has been a detailed investigation into what these impacts are, how varied they can be, and how they can propagate over time. This base figure of 57 underlines how damaging cyber-incidents can be.
New approach establishes clear boundaries for where sharing should and should not happen, so that programs with sensitive information can keep that data reasonably secure.
Cyber deception is a responsive technique that puts malicious hackers into a fake environment once the system detects a hack in progress.
The commercial availability of high-pixel-count digital cameras in recent years has opened up the possibility of cracking finger-vein authentication systems through the use of finger vein patterns extracted from photographs. Since biological information is lifetime invariant, care must be taken in its use.
A Nigerian email scammer gang has evolved to the point where it has corporate-style specialist departments and uses commercial business intelligence data brokers to help plan its attacks.
Study shows that terahertz data links, which may play a role in ultra-high-speed wireless data networks of the future, aren't as immune to eavesdropping as many researchers have assumed. It is possible for a clever eavesdropper to intercept a signal from a terahertz transmitter without the intrusion being detected at the receiver.
Publicizing firms' security levels not only leads to greater transparency, but it could also be used to strengthen their security over time. In addition, organizations with poor performance could face greater pressure from their customers and a loss of reputation.
IT security departments are undervaluing a range of business assets, from research and development to financial reports. In contrast, they are over-prioritizing less-sensitive data related to personally identifiable information (PII). When IT security departments undervalue these assets, they also underestimate the safeguards that should be put in place in order to protect the business assets, thereby increasing the security risk.
Hotel chain Marriott has confirmed widespread reports that it suffered a significant data breach with the sensitive details of 500 million customers possibly compromised.
Normally, an oscilloscope would be the last thing an admin would have to worry about, however as new connectivity is bolted onto devices that traditionally operated in isolation, it is inevitable that some otherwise basic security measures will be overlooked. It is not beyond the realm of possibility that a company wanting to hamper the progress of a rival, or a state-sponsored group that wanted to disrupt R&D, would look to mess with engineering equipment of a targeted facility.
Britain’s biggest employer organisation and main trade union body have sounded the alarm over the prospect of British companies implanting staff with microchips to improve security.
Attackers exploited a vulnerability in Facebook’s code that existed since July 2017. The interaction of three distinct bugs allowed the attackers to steal Facebook access tokens.
A Japanese minister in charge of cybersecurity has provoked astonishment by admitting he has never used a computer in his professional life, and appearing confused by the concept of a USB drive.
Poor leadership, budgetary constraints, deficient IT systems and a lack of qualified staff mean another attack on the health service is inevitable.
Researchers have used a neural network to generate artificial fingerprints that work as a “master key” for biometric identification systems and prove fake fingerprints can be created.
This facial mapping technology has been designed to improve television language dubbing, but it also has strong potential for those seeking to deceive.
The macro remains the email attachment of choice for delivering malicious payloads.