The FBI has successfully retrieved data off the iPhone used by one of the San Bernardino shooters and is withdrawing its motion to have a federal court order Apple to help the government unlock the phone. A federal law enforcement official declines to characterize the information discovered on the device.
Security leaders discuss the cyber-threat challenges facing India's critical infrastructure, including energy, manufacturing, defense and transportation. What new strategies, solutions and best practices do they suggest to respond to emerging threats?
Verizon Enterprise Solutions, which regularly assists clients in responding to their data breaches, admits it's suffered its own breach. The breach of contact information reportedly affected 1.5 million business customers, who now face greater risk of phishing attacks.
Experts say the cyber world is becoming more complex with growth in interconnected devices, and emphasize the need to build a resilient cyber defense that can help resist and respond to emerging threats. There is a need to re-think their approach to security.
The Justice Department has unsealed indictments against seven Iranians, allegedly working on behalf of the Iranian government, who are suspected of conducting DDoS attacks against dozens of American banks and attempting to seize control of Bowman Dam outside New York City.
The PCI Security Standards Council envisions a single, globally-unified data security standard. Now that the European Card Payment Association is a strategic regional member, that goal is significantly closer, says Jeremy King, the council's international director.
Vikrant Varshney of Risk Resources believes cyber threats are a concern of every individual, every organization who thought IT is just a system. A collaborative approach in building awareness is acute to fight this cyberwar, he says.
The Department of Justice has been granted a delay of a March 22 hearing relating to a court order compelling Apple to help the FBI unlock the iPhone 5C issued to San Bernardino shooter Syed Rizwan Farook. That's because it says it may have found a way to unlock the phone without Apple's assistance.
In revised guidance, the National Institute of Standards and Technology cautions enterprises to assume that "external environments contain hostile threats" as they establish programs to allow employees and contractors to remotely access critical systems.
Apple has unloaded another blistering legal response to the Justice Department over the court order obtained by the FBI that requires the company to help unlock an iPhone used by one of the San Bernardino shooters.
ISMG's Data Breach Summit aims to provide insights from industry thought-leaders on the best defense strategies for tackling future breaches. The conference kicked off to great traction from the security community.
Without saying the word "backdoor," President Barack Obama used an appearance at the South by Southwest conference to argue that law enforcement agencies need weak crypto and likened strong crypto to "walking around with a Swiss bank account in [your] pocket."
Credit card and other personal information was exposed in a data breach of Internet hosting provider Staminus Communications, which specializes in protection against distributed denial-of-service attacks. The company hosts the website of the Ku Klux Klan white supremacist group, which was also brought down.