News that a state agency in India was the victim of a ransomware attack highlights the need for public and private sector organizations to promptly take appropriate action to mitigate their risks as hackers start going after low-hanging fruit.
The Yahoo breach - and the theft of unencrypted security questions and answers - is a reminder to use unique passwords and security questions, store them using a password safe and take advantage of two-factor authentication whenever it's available.
In an in-depth interview, Rama Vedashree, the new CEO at the Data Security Council of India, describes efforts to grow the nation's cybersecurity industry, help states implement security policies and train public sector leaders on key issues.
FBI Director James Comey, Facebook CEO Mark Zuckerberg and security expert Mikko Hypponen all advocate covering up your webcam as a cheap and no-brainer defense against everything from unscrupulous competitors to sextortionists.
The massive Sony breach spelled out the risks facing any business that deals in digital content. Here's how David Hahn, CISO of publishing giant Hearst, keeps the cybersecurity conversation going with his board of directors.
The breach of porn site Brazzers - which allows users to swap fantasies in online forums - begs the question of how many users employed throwaway usernames and passwords. Some 1,446 U.S. military and 41 U.S. government email addresses were found in the data dump.
If Russia is, indeed, meddling with the U.S. election, there's an obvious explanation: It's irritated by U.S. policy. But if Russia's frustration is being expressed through cyberattacks, how can the U.S. respond?
Web portal Rambler - likened by some to a Russian version of Yahoo - was reportedly hacked in 2012, resulting in the theft nearly 100 million user credentials. But the company disputes some aspects of the supposed breach.
In their quest for easy ways to extort victims into giving them bitcoins, cybercriminals continue to double down on crypto-ransomware attacks and increasingly target enterprises, seeking proportionally higher paydays.
In an interview, Internet pioneer Vint Cerf says he sees a secure future for the network of networks he helped create four decades ago as the co-developer of TCP/IP, the protocol that facilitates internet communications.
Ashley Madison, the extramarital online hookup service breached by attackers in 2015, has agreed to bolster its information security and data retention practices after regulators in Australia and Canada ruled that the site violated local privacy laws.
Malware researcher Ivan Kwiatkowski unleashed ransomware on tech-support scammers after his parents stumbled across a site warning they'd been infected by Zeus. Despite the feel-good factor, however, security experts advise against hacking back.
Ransomware and extortion are among the threats that have successfully transitioned from an original B2C business model to targeting enterprises. Trend Mirco's Myla Pilao shares insight on this and other attack trends in Asia.
Unlike other malware, ransomware practically screams and shouts at victims, and that distinct behavior holds promise for helping to better detect and block ransomware infections, according to Northeastern University security researchers.