A decade's worth of breaches has led to this. Forward-looking threat researcher Numaan Huq analyzes what has happened to the stolen data affecting major US industries. We map out the probabilities; see where the information goes and how much it's sold.
This latest paper details the latest activities of Rocket Kitten, a threat actor group involved in Operation Woolen-Goldfish last March, and how they've been found to be attacking multiple targets in the Middle East.
While not done for profit, hacktivism has forced companies and organizations to face critical security challenges. Find out what it is and how it evolved from being the “Internet’s voice” to one of today's biggest security threats.
Between 2012 and 2014, the cyber-attacks on the healthcare industry caused it to suffer more than business, government, and military sectors. Attacks have only gotten bigger since then. What makes healthcare such ideal targets?
What will the threat landscape look like in the next two years? How will it evolve? The "FuTuRology" project attempts to answer these questions in a series of articles that covers the future of threats to different industries.
Online "cheating network" Ashley Madison recently got hacked, and the hackers are threatening to expose its users' personal information unless their demands are met. The interesting part: They're not asking for money.
As smart devices become more prevalent and are used in critical situations, software developers will have to understand that they now have a greater responsibility to keep their software products safe.
Password managers have made the tedious task of managing multiple accounts easier with the use of a single repository of various login credentials locked behind a master password. But what if this, too, gets hacked?