BOSTON (Reuters) - Cyber criminals have infected hundreds of thousands of computers with a virus called Pony to steal bitcoins and other digital currencies, in the most ambitious cyber attack on virtual
Joerg Asma's insight:
Interesting combination: Somebody steals something most of the nations do not accept: BitCoins. Nevertheless the user looses real money. How does law enforcement / police etc react in case that someone will be arrested?
Cybersecurity, back in the news NIST, one of the most useful government agencies most compliance officers never encounter, just published a new framework for managing such risks. The SEC and Congress are on the warpath for companies to manage cybersecurity more effectively. How can compliance officers help put together an effective risk management program Editor Matt Kelly has some thoughts.
From electronic surveillance to healthcare privacy to drones, Congress is planning to consider a wide range of privacy legislation this year. The Edward Snowden leaks about the National Security Agency and the recent data breaches at retailers are likely to keep privacy and data security on the top of many lawmakers’ agendas. Here is a summary of twenty pending privacy-related bills to keep an eye on during the remainder of the 113th Congress.
Introduction I receive many questions from people who don’t work in the security field about the use of stolen credit card data in the cyber-crime ecosystem, so I decided to provide more information, starting from the clamorous data breach of the...
When Barack Obama announced his reforms of National Security Agency surveillance programs today, few people were as interested as Larry Page, Mark Zuckerberg, Tim Cook, Marissa Mayer, and Steve Ballmer.
After a year-long sprint, the Department of Commerce’s National Institute of Standards and Technology (NIST) published the finalized version of the first Framework for Improving Critical Infrastructure Cybersecurity.