HyTrust president Eric Chiu suggests the total cost could eventually exceed $1 billion.
Two thirds of CIOs and CISOs say senior leaders in their organization don't view cyber security as a strategic priority.
The data potentially exposed includes names, addresses, phone numbers and Social Security numbers.
The company says it had no knowledge of any access, and believes its products are secure.
It's not yet clear how much data the attackers have taken.
The company says it has investigated the software and hasn't found 'any evidence to substantiate security concerns.'
The group's tools are capable of reprogramming hard drive firmware, allowing infections to survive disk formatting and OS reinstallation.
That's a 78 percent increase from the previous year, according to Gemalto.
Banks were infected for between two and four months, with $2.5 million to $10 million stolen in case.
Infection rates for Android devices are now equal to those of Windows laptops, according to Alcatel-Lucent's Motive Security Labs.
According to iSIGHT Partners, the hackers were part of a Chinese group called the Codoso Team or the Sunshop Group.
The FBI is investigating the attack.
Voice commands are forwarded to third-party service provider Nuance Communications.
The report, from U.S. Senator Edward Markey, is based on 16 automakers' responses to questions regarding tracking systems and security.
All the affected locations are run by franchise operator White Lodging Services.
As many as 80 million names, birthdates, Social Security numbers, street addresses and email addresses may have been accessed.
Book2Park is the third airport parking site to be breached in as many weeks.
Patient names, addresses, birthdates, medical record numbers and Social Security numbers may have been accessed.
Victims range from home healthcare patients to pediatric eyewear customers.
'An attacker could shut down over 5,300 fueling stations in the United States with little effort,' says Rapid7's HD Moore.
Foreign companies selling equipment to Chinese banks will also be required to disclose source code and submit to audits, the New York Times reports.
A recent survey also found that 59 percent of U.S. IT decision makers believe privileged users pose the greatest threat to their organizations.
Rahul Sasi has tested the malware on the DJI Phantom and Parrot AR.Drone 2.0.
While the hackers claim to have accessed customer data, the airline says 'user data remains secured.'
Credit card numbers and Social Security numbers appear to have been accessed.
- Jan 2015
- Dec 2014
- Nov 2014
- Oct 2014
- Sep 2014
- Aug 2014
- Jul 2014
- Jun 2014
- May 2014
- Apr 2014
- Mar 2014
- Feb 2014
- Jan 2014
- Dec 2013
- Nov 2013
- Oct 2013
- Sep 2013
- Aug 2013
- Jul 2013
- Jun 2013
- May 2013
- Apr 2013
- Mar 2013
- Feb 2013
- Jan 2013
- Dec 2012
- Nov 2012
- Oct 2012
- Sep 2012
- Aug 2012
- Jul 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Nov 2011
- Aug 2011
- Jun 2011
- Mar 2011
- Dec 2010
- Sep 2010
- Aug 2010
- Jul 2010
- Jun 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Apr 2006
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?