China is the "leading suspect" behind the OPM breach, says Director of National Intelligence James Clapper, who adds that until the U.S. can meaningfully deter such attacks, it must focus on getting better at defense, not retribution.
China and the U.S. have agreed to create a new cyber "code of conduct." The move comes in the wake of the U.S. Office of Personnel Management breach, with President Obama urging Chinese officials to help lower cyber-related tensions.
European authorities say they have disrupted a Ukraine-based cybercrime gang tied to $2.2 million in fraud in Europe, the United States and beyond, perpetrated via banking Trojans, botnets and hacking-for-hire services.
A growing number of ATM card reader eavesdropping attacks involve attackers getting in through a tried-and-true method - taking advantage of commonly used electronic access keys or codes. What can be done to stop these attacks?
A "deliberate" denial-of-service attack against state-owned LOT Polish Airlines resulted in ground crews being unable to generate flight plans. The airline now says its systems were not hacked, but rather disrupted, and that all airlines face similar risks.
India has yet to experience a data breach on the scale of Sony or Home Depot. But the market is growing, and so are breach risks, says Kroll's Reshmi Khurana. How must security leaders prepare their organizations?
Office of Personnel Management Director Katherine Archuleta tells Congress that neither she nor anyone else at OPM should be held personally responsible for a breach of agency computers in which the personal information of millions was stolen.
The Ministry of Home Affairs has instructed the Intelligence Bureau to create a cybersecurity architecture and a specialised wing to augment infrastructure. This must be immediate, practical and real, experts say.
The hack of the U.S. Office of Personnel Management may have exposed personal information for "tens of millions" of people, a new report says, with a single database containing information for 18 million people.
Those advocating the use of the ".bank" top-level domain argue that it offers better security than ".com." In part one of a two-part interview, Craig Schwartz of fTLD Registry Services and Doug Johnson of the ABA explain the security provisions.
Law enforcement officials in Europe plan to disrupt the use of social media to broadcast "terrorist and extremist propaganda," but security experts questioned whether such moves will blunt the recruitment of new ISIS fighters and so-called "jihadist brides."
Polish airline LOT claims that a hack attack disrupted its ground-control computers, leaving the airline unable to issue flight plans and forcing it to cancel or delay flights, grounding 1,400 passengers.
Fortinet's annual Security Census 2015 reports that APJ CISOs faced major vulnerabilities in 2015 via unsecured wireless networks. Experts advise on protection methods for wireless networks.
When it comes to malware, how wide is the gap between infection and detection - and what is the potential business impact on organizations? Paul Martini, CEO of iboss Cybersecurity offers insights and strategies.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.