Following the government's recent demonetisation drive, the use of "cashless" transactions is rapidly expanding in India. CERT-In has issued guidance on how to mitigate the new security risks involved. But will it prove helpful?
In an audio interview, Steve Durbin, managing director of the Information Security Forum, offers a forecast of the top security threats for the year ahead, including the ramping up of attacks fueled by "crime-as-a-service" offerings.
Dailymotion, the popular Vivendi-owned video website, has allegedly suffered a data beach that may affect 87 million accounts, according to a report from stolen data aggregator LeakedSource.
Representatives of government and various business sectors discussed actionable steps to create a cyber-secure environment at Information Security Media Group's recent GovInfoSec Summit Asia 2016 in New Delhi.
Hackers apparently stole $31 million from accounts that banks keep at Russia's central bank in a series of cyberattacks this year, according to several news reports. The news comes as the country's security service also claims to have fought off broader attacks against the financial services industry.
Cyber espionage and other increasingly sophisticated nation-state cyberattacks will escalate into what amounts to "cyberwar" in 2017, predicts security expert Michael Bruemmer of Experian Data Breach Resolution.
Cyberattacks waged by organized crime groups are simultaneously targeting a wider array of industries worldwide, which is why cross-industry threat information sharing is more critical than ever, says Brian Engle, executive director of the Retail Cyber Intelligence Sharing Center.
The Internet Archive, a pioneering 20-petabyte digital repository, is raising funds to replicate its data in Canada. The group's founder fears that the election of Donald Trump as the next U.S. president portends an uncertain privacy rights future.
ISMG's upcoming Breach Prevention Summit in New Delhi shares steps for creating a cybersecure environment, as experts will discuss new approaches to tackle breaches and issues related to national critical infrastructure.
Britain has enacted a new mass surveillance law - the Investigatory Powers Act - which will allow the government to demand backdoors from tech companies to intercept communications. But at what cost?
Score one for preparation: In the wake of a ransomware attack that infected 900 workstations, the San Francisco Municipal Transportation Agency says it's restoring affected systems, vowing to not give the attackers a single bitcoin of their ransom demand.
After the recent compromise of 3.2 million debit cards details in India, Ravi Shankar Prasad, minister of IT and law, is calling for more organizations to have a third-party security audit and hire a CISO.
A lack of incident response planning often leads to an unanticipated series of serious consequences for organizations that experience data breaches, Joey Johnson, CISO of Premise Health, says in this video interview.
Cybercriminals broke into the payment card processing system used by the Madison Square Garden Co., owner of Radio City Music Hall and other iconic entertainment venues, harvesting payment card details for nearly a year.
Three Mobile, one of the largest U.K. mobile providers, saw more than 132,000 accounts breached in a scam in which fraudsters ordered new devices for customers and then tried to intercept the deliveries.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.