Breached dating site Ashley Madison is offering a $500,000 reward for information relating to the attack. The FBI, which is leading the investigation, is treating the breach as a national-security matter.
The Modi government has funded the proposed Smart Cities project, and Nasscom and Accenture now have developed an ICT blueprint. But some industry leaders say that security has not been sufficiently addressed.
The Ashley Madison hackers have released a third data dump, and security experts warn that spam campaigns and extortion attacks now target supposed users of the dating site, sometimes demanding bitcoins - or else.
One security expert says the highly-publicized breach of online dating website Ashley Madison appears to include the exposure of sensitive, personal details relating to between 100,000 to 150,000 registered customers in India.
In the wake of U.S. and Indian discussions to develop a common response to combat cyber-threats, India's security leaders say a new, systematic approach is needed to define the nation's cyber defense model.
The Ashley Madison mega-breach differs from previous breaches not just because of its scale, but also the fallout facing victims of the breached infidelity-focused dating site. Here are the top information security takeaways.
In the wake of the discovery of the serious Android Stagefright flaws, which affect an estimated 950 million devices, security researchers reveal that they discovered yet another Stagefright flaw - and that Google's initial fix could be exploited.
After Target's $67 million settlement with Visa to reimburse banks for expenses related to the retailer's 2013 breach, MasterCard confirms it is weighing a new deal. Will settlements derail a pending lawsuit against the retail giant?
Blue Coat CTO Dr. Hugh Thompson speaks about the future of security, the constants that need attention, and lessons to be learned from the U.S. when it comes to writing meaningful breach notification laws.
Security risks of real-time mobile payments increase as adoption of mobile devices and applications grow. PwC's Suhas Desai shares risk mitigation strategy through application and mobile security best practices.
Application Programming Interfaces have security vulnerabilities that pose significant business risk. CA's Vic Mankotia cautions security leaders about how they manage APIs to secure digital identities.
What do successful but separate malware attacks against banking customers around the world, as well as the White House and health insurer Anthem, all have in common? Researchers say the answer is shockingly simple.
In a security landscape where the frenetic pace of technology has changed paradigms in ways organizations are struggling to cope with, Blue Coat's Hugh Thompson advises adopting a 'Degrees of Freedom' approach.