Fraud

No, We Didn't Get Hacked: Dixons' PC World loses customer data in cyber attack

As reported by Reuters earlier this week, British mobile phone and electrical retail chain Dixons Carphone has reported their second major cyber attack in three years after discovering unauthorised access to the payment data of PC World retail customers.

Partner Content
The Human Factor: Keeping Your Cybersecurity Defence Strong and Secure

Most big surveys reckon that human errors are at the heart of security incidents.

Robust security with 99.99 percent uptime – LogMeIn CISO tells us how it’s done

From taming the DevOps beast to building a highly resilient architecture, Gerald Beuchelt, CISO at LogMeIn shares his strategy to thrive in the rapidly changing threat landscape.

What is a Chief Security Officer? Understanding this critical role

The Chief Security Officer (CSO) is the executive responsible for the organization's entire security posture, both physical and cyber, and has the big picture view of the company's operational risk.

What to do after a data breach: 5 steps to minimize risk

Website database breaches happen, and while there's little you can do to prevent them you can minimize your exposure. Here's what to do.

Online voting is impossible to secure. So why are some governments using it?

If you thought electronic voting machines were insecure, wait 'til you meet online voting.

Police cracks the whip on world's largest DDoS marketplace

A joint operation by law enforcement agencies around the world has shut down webstresser.org, which launched 4 million DDoS attacks and targeted banks, governments and enterprises. 

New Georgia law criminalizes good-faith security research, permits vigilante action

Georgia cybersecurity folks are outraged about SB 315, and warn that it could cost the state jobs.

Insurance companies, Cognizant build blockchain solution for data sharing and security

Leading Indian life insurers partner with cognizant to develop industry-wide blockchain solution for secure data-sharing and improved customer experience.

The clearer the CSO role, the easier to get budget approved: Mushtaq Ahmed, CSS Corp

For an organization to be secure from any cyber threats, investments should be made in technology, people, and policy, says Mushtaq Ahmed of CSS Corp.

What is DNS and how does it work?

The Domain Name System resolves the names of internet sites with their underlying IP addresses adding efficiency and even security in the process.

Verizon report: Ransomware top malware threat of 2017, moving into critical systems

DDoS attacks are also on the rise, but spying reports are down. Fewer people are clicking on phishing links.