Holding North Korea responsible for the cyber-attack on Sony Pictures Entertainment, President Obama on Jan. 2 imposed sanctions on 10 individuals and three entities associated with the North Korean government.
The FTC has approved a final order settling charges that Snapchat, which offers a photo messaging app, deceived consumers with promises about the disappearing nature of messages sent through the service.
Spear phishing is going to be a leading worry for banks in 2015, as hackers increasingly target bank employees to compromise credentials used to access consumer and business accounts as well as critical servers and systems.
New comments from the CEO of Sony Pictures about the film studio's response in the aftermath of a massive cyber-attack highlight the need for all organizations to ensure their business continuity plans specifically address cyber-attack risks.
"Cybercrime as a Service" is the latest threat evolution, and traditional defenses continue to fall short. Derek Manky of Fortinet discusses the merits of information sharing and the new Cyber Threat Alliance.
At least 12 million home and small-office routers from 50 manufacturers have a flaw that an attacker could remotely exploit to seize control of the device, steal data and redirect users to attack sites, warns security vendor Check Point.
Who hacked Sony Pictures? While the FBI still says North Korea ordered the online attack, new evidence suggests the hack may have been the work of insiders or hacktivists, and Russian-speaking attackers may have been involved.
North Korea criticizes President Obama for backing the release of a comedy about the assassination of its leader, denies ordering the hacking of Sony Pictures and blames the U.S. for its Internet and mobile network outages.
Distributed-denial-of-service attacks, fueled by the interconnected nature of smart devices, will only continue to increase, says Matt Moynahan, president of Arbor Networks. "The infrastructure itself is insecure," he says.
While the FBI may have attributed the hack attack against Sony Pictures Entertainment to North Korea, many information security experts remain unconvinced, based on the evidence that's been released to date.
After the complete collapse of network security at Sony Pictures - in the wake of its data breach - it's important that we highlight some of the organization's fundamental security mistakes. Here's a macro view of the lessons we must all learn.
Once a file enters the network, we often lack the tools to monitor the file's behavior. In essence, using the point-in-time model, the security professional cannot retry the file for guilt or innocence.