A federal judge has ordered Capital One to turn over a forensics report covering its 2019 data breach, which has been sought by plaintiffs in a class action lawsuit. The report, if it becomes public, could shed light on one of last year's biggest breaches.
European budget airline EasyJet says it suffered a data breach that exposed 9 million customers' personal details. While no passport details were exposed, the company's ongoing investigation has also found that attackers "accessed" a small number - just 2,208 - of customers' payment card details.
For many cybercrime investigators, it's all about indicators of compromise - evidence that a crime has occurred. But what if you were to shift toward cataloging behaviors that could indicate an attack is ongoing or imminent? Sam Curry of Cybereason explains the IoB concept.
As phishing campaigns and hacker attacks spread during the COVID-19 global pandemic, it's more important than ever for organizations to promptly report fraud to authorities to help them crack down on cybercrime, says Dr. Karnika Seth cyberlaw expert and advocate at Supreme Court of India.
FireEye researchers are tracking a hacker campaign using a new type of backdoor they call "Minebridge" that has primarily been targeting U.S. financial firms this year.
Apple previously scuttled plans to add end-to-end encryption to iCloud backups, Reuters reports, noting that such a move would have complicated law enforcement investigations. But the apparent olive branch hasn't caused the U.S. government to stop vilifying strong encryption and the technology giants that provide it.
Organizations need to make sure they have the right tools to enable digital forensics teams to determine the origin of an attack, says Dr. Gaurav Gupta, a scientist at India's Ministry of Electronics and Information Technology, who describes "forensics readiness."
The FBI has sent a letter to Apple asking for help in accessing encrypted data from two iPhones belonging to a deceased shooter. The bureau's move may be a prelude to another legal fight between the FBI and Apple over strong encryption.
The Cyber Security Agency of Singapore has come up with an operational technology and cybersecurity master plan aimed at building a secure and resilience ecosystem to protect critical infrastructure. But will implementation prove feasible?
The Indian government is putting pressure on WhatsApp to develop a mechanism to trace the origins of fake messages that threaten the nation's security. Will WhatsApp take action? And what do security experts say about the feasibility?
The discovery of an apparent data breach at Indian IT service firm Wipro could hurt the firm's reputation, as well as the reputation of other outsourcing companies, some observers say.
When a total of $580 Million left two Cryptocurrency exchanges after a sophisticated compromise, LIFARS team was engaged in an investigation that involved FBI, US Secret Service, Europol, DHS, IRS and DOJ. This session will take you exclusively inside that investigation and discuss:
Cryptocurrency fraud schemes,...
A security audit of popular password managers has revealed some concerning weaknesses. Luckily, none of the problems are showstoppers that should put people off using such applications. But the research shows that some password managers need to more thoroughly scrub data left in memory.
Recent apparently state-sponsored hack attacks have hit dozens of companies in the U.S. and political parties in Australia. Officials say China and Iran appear to have escalated their online espionage campaigns, seeking to gather better intelligence and steal intellectual property.
This Valentine's Day, authorities are once again warning individuals to watch out for anyone perpetrating romance scams. The FTC says Americans lost $143 million to romance scams in 2017, while in the U.K., Action Fraud says reported romance scam losses in 2018 topped $64 million.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.