The online dating website eHarmony has warned a "small fraction" of its users of a June 6 breach that likely exposed hashed passwords. Whether the incident is related to a LinkedIn breach has not been confirmed.
An attorney, mortgage broker, loan processor and loan originator have been indicted for the roles they allegedly played in a fraud scheme involving at least 35 mortgage loans worth more than $16.2 million.
Mobile security threats can be managed through testing and strategic risk-mitigation strategies, says Keith Gordon, who oversees authentication and security strategies for Bank of America's consumer online and mobile banking units.
Why did hackers target the federal Thrift Savings Plan? Details from the FBI and the TSP have been sketchy, and Sen. Susan Collins is demanding more information - including the reasons behind the delayed notification.
Flame is designed to carry out cyber espionage and steal valuable information, including but not limited to computer display contents, information about targeted systems, stored files, contact data and audio conversations.
Many organizations aren't devoting enough resources to ensure that applications for mobile devices are secure, says security expert Jeff Williams. He offers five tips for adequately addressing mobile application security.
Israel is being blamed - or, perhaps, taking credit - for the creation of Flame, the sophisticated cyberspyware that has targeted organizations in the Middle East, especially its mortal enemy, the government of Iran.
The National Institute of Standards and Technology's guidance recommends how and when cloud computing is appropriate, addresses risk management issues and indicates the limits of current knowledge and areas for future research and analysis.