Network Security 

6 Criteria for Evaluating Secure File Transfer Apps

Secure file transfer applications are becoming the preferred mode for securely exchanging data. What should you consider when buying SFT apps?

Russian Hackers Breach JPMorgan Chase, Four Other U.S. Banks

The hackers stole gigabytes of sensitive data, though it's not clear whether the attacks were aimed at financial gain or cyber espionage.

Over 1,000 U.S. Businesses Infected with Backoff PoS Malware

A DHS advisory urges companies to work with IT, anti-virus vendors, managed service providers and PoS system vendors to check for vulnerabilities.

Three Quarters of South Korean Population Affected by Massive Data Breach

27 million names, resident registration numbers, account names and passwords were allegedly accessed by a Chinese hacker.

Using PowerShell and JEA to Secure Windows Server Systems

Microsoft Windows PowerShell and JEA simplify the process of moving from global administrator accounts to limited local accounts, a best practice in securing Windows Server-based systems.

Sony Networks Taken Down by DDoS Attack

'We have seen no evidence ... of any unauthorized access to users' personal information,' the company stated.

Community Health Systems Breach Linked to Heartbleed Bug

Recent research by Venafi found that 97 percent of Global 2000 organizations' public servers remain vulnerable to Heartbleed.

U.S. Colleges and Universities Are Failing at Cyber Security

According to a recent BitSight report, the higher education sector is less secure than retail or healthcare.

UPS Store Acknowledges Credit Card Breach

Customer names, mailing addresses, email addresses and payment card information may have been accessed at 51 stores in 24 states.

Big Data Overwhelms Security Teams

Experts say increased automation and better analytics will help security teams overwhelmed by Big Data.

Nuclear Regulatory Commission Hacked Three Times

At least two of the attacks were launched from overseas.

Chinese Hackers Breach Community Health Systems, 4.5 Million Affected

The hackers stole about 4.5 patients' names, addresses, birthdates, phone numbers and Social Security numbers.

Supervalu Admits Massive Supermarket Credit Card Breach

Potentially affected stores include Acme Markets, Cub Foods, Farm Fresh, Horbacher's, Jewel-Osco, Shaw's, Shop 'n Save, Shoppers and Star Markets.

Startup Spotlight: CloudPassage's Software-defined Security

As the software-defined data center becomes more common, enterprises are seeking security solutions that are abstracted from the underlying infrastructure.

Bank Faces Lawsuit Over $327,000 in Losses from Cyber Attack

Hackers stole the funds from TEC Industrial in 55 separate ACH drafts on May 10, 2012.

Security Research and the Law: What You Need to Know

Security researchers must navigate a minefield of U.S. laws and statutes, such as the Computer Fraud and Abuse Act.

Password Manager LastPass Suffers Outage

A data center outage left the popular password management service inaccessible for several hours.

Computer Thefts Expose Over 45,000 Patients' Personal Data

Unencrypted computers containing the data were stolen from three different medical facilities.

Hackers Stole 2 Million Customer Records Per Day in Q2 2014

More than 175 million customers records were stolen in the second quarter of the year, according to SafeNet.

Breach at USIS Exposes Government Employees' Data

The company says the breach 'has all the markings of a state-sponsored attack.'

Cancer Clinic Employee Charged with Theft of Patient Data

More than 2,000 current and former patients may be affected.

Yahoo CISO Details Challenge of Security at Scale

Security vendors focus on banks not Web-scale companies, says Yahoo CISO Alex Stamos.

Gambling Site Acknowledges Four-Year-Old Data Breach

649,055 customers' names, user names, mailing addresses, email addresses, phone numbers and birthdates were exposed.

CyberVor Breach Exposes 1.2 Billion User Names, Passwords

A Russian gang of fewer than a dozen hackers has collected more than 4.5 billion user records from over 400,000 websites and FTP sites.

Using Military Strategy to Fight Cyber Battles

What does the Library of Sparta have to do with modern IT security? Military strategies are increasingly common in cybersecurity – and with good reason.