CareFirst, a Blue Cross Blue Shield plan, have suffered a breach in which the attackers gained access to one of their databases.
Akamai Technologies analyzed thousands of DDoS attacks as well as nearly millions of web application attack triggers across the Akamai Edge network.
A malicious version of the popular open source SSH client PuTTY has been spotted.
A new legislation exempts intelligence services' employees from being prosecuted for hacking.
The Belgian Privacy Commission has issued a set of recommendations for both Facebook, website owners and end users.
A group of researchers from Purdue University in Indiana have come up with an effective and easy-to-implement solution for protecting passwords from attackers.
While no true security best practices exist, the key is in identifying the security metrics that mean the most to the organization and focusing on those activities to remediate specific vulnerabilities.
All in all, nearly 100 devices are affected by this vulnerability. TP-Link already released some fixes, and it's planning to issue more soon. Netgear is working on them too.
FireEye researchers have calculated how much cybercriminals wielding TeslaCrypt and AlphaCrypt have managed to extort. The researchers were able to calculate the sum because most victims preferred to pay the lesser ransom amount using Bitcoin instead of PayPal My Cash cards.
Trust. Itís a small word but it conveys a lot. To many it is the cornerstone of security, because without trust there can be no security. To operate securely in the online world, businesses need to trust the technology they use.