The arrest of Giulio Occhionero and his sister, Francesca Maria, has brought to light what appears to be the biggest, and highest-profile, hacking of institutional and corporate accounts ever reported in Italy.
In late 2015 and early 2016, the Enterprise Strategy Group (ESG) conducted a research survey of 184 IT and cybersecurity professionals with knowledge of, responsibility for, or day-to-day operational oversight of incident response
The U.S. government should consider a broad range of retaliations against Russia for its attempts to interfere with November's presidential election, the outgoing director of national intelligence recommended.
You've seen the headlines: cyber breaches at major corporations jeopardizing confidential information for millions of users; highly targeted spear phishing campaigns delivering malware deep into networks; and DDoS attacks at
A $1 billion Russia-based criminal gang has been bilking online advertisers by impersonating high-profile Web sites like ESPN, Vogue, CBS Sports, Fox News and the Huffington Post and selling phony ad slots, but that’s about to end.
Good DNS management is pivotal to strong security. Is your DNS strategy ready for new types of attacks? Utilizing a single Managed DNS provider isn't the only answer. Tom Pageler, CRO & CSO at Neustar, and Michael Smith, Chief
Panasonic angrily refutes report about in-flight entertainment system security flaws after report suggested it is theoretically possible to hack airplane entertainment systems which are used by numerous airlines.
In the world of ever-evolving ransomware, one recently spotted variant is like doxware -- pay up or your passwords and files are leaked online; another has a 'nasty' option to infect two other people and have your files decrypted for...
Today, none of us are immune to the impact of botnets on Internet-connected organizations. There is ample validation that monitoring the communications patterns between command-and-control servers and their intended victims is vital.
One of the hackers purportedly responsible for a zombie army of Mirai-infected IoT devices, claimed he have infected millions of routers with malicious firmware which can't be removed; a victim's only recourse is to trash the router.