The websites of seven of India's embassies apparently were hacked and some data pertaining to Indian citizens leaked online by the attackers claiming responsibility. The hackers say they wanted to call attention to the sites' vulnerabilities.
The Domain Name System is crucial to the functioning of the internet, but largely taken for granted - until it breaks. In an audio interview, Cricket Liu of Infoblox discusses how DNS providers must improve security.
Yahoo is appealing to the U.S. director of national intelligence to declassify an order that allegedly required the company to install secret spying software that scanned incoming email accounts for specific content.
Russian hackers may think twice before traveling outside the country for a vacation in light of the arrest of alleged 2012 LinkedIn hacker "Yevgeniy N." by Czech police at a restaurant in Prague earlier this month.
Intellectual property and protected health information are both extremely valuable to cybercriminals, which is why hackers are increasingly targeting healthcare organizations. Increasingly, patients, providers, pharmaceutical companies and others are relying heavily on mobile devices to exchange sensitive information,...
WikiLeaks leader Julian Assange's interference in the U.S. elections has earned the Ecuadorian embassy in London's houseguest a slap on the wrist as his internet connection gets taken away. In the interim, maybe he can take up knitting?
A search warrant executed earlier this year gave authorities the power to force occupants of a Los Angeles-area house to unlock devices with their fingerprints, casting doubt on biometric defenses.
Verizon is reportedly awaiting the full results of a digital forensic investigation into the record-setting Yahoo data breach to ascertain whether it will revise its $4.8 billion bid to buy the search firm. Did the breach have a "material impact" on Yahoo's business? That's the question.
It takes vigilance, resources and effort to ensure that protected health information is secured on all devices where it resides. Organizations must create a complete inventory of all devices containing PHI, and then implement all necessary steps to ensure it stays secure, no matter where it's stored. In this session,...
For the second time in less than two weeks, a set of data released by the Australian government has been taken offline over fears it wasn't securely anonymized, posing a possible privacy risk.
In a rare case of potential breach accountability, Verizon is reportedly demanding a $1 billion discount to acquire Yahoo as a result of the search giant's failure to more rapidly spot a data breach that compromised at least 500 million users' accounts.
The challenge for Anderson Insurance Associates, a Charleston-based Insurance agency was to have a secure, central storage of shared company passwords to address lost employee productivity and IT burden caused by password-related processes.
The company had been letting employees manage passwords on their own,...
As an expanding organization working nationwide to effect change, Code.org began to experience "growing pains". In addition to staff turnover, as the organization changed and expanded, so did the needs of the staff and the number of technology tools in use. Their team manages projects across United States. The entire...
FlightNetwork.com has grown to become the largest Canadian-owned online travel agency in Canada, and second most-visited behind Expedia. With teams spread across different locations and time zones, being able to quickly and securely address IT needs is a top priority for the organization. And with a growing IT team...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.