Between 2012 and 2014, the cyber-attacks on the healthcare industry caused it to suffer more than business, government, and military sectors. Attacks have only gotten bigger since then. What makes healthcare such ideal targets?
A custom honeypot was used to test the security of US automated gas tank systems. How are attackers abusing the system and which targets did they prefer?
To help develop the mindset that a real-world, discerning top company executive needs to address targeted attacks, Trend Micro created a game that challenges players to protect company information. Can you pass the targeted attack test? Play the game!
What will the threat landscape look like in the next two years? How will it evolve? The "FuTuRology" project attempts to answer these questions in a series of articles that covers the future of threats to different industries.
Online "cheating network" Ashley Madison recently got hacked, and the hackers are threatening to expose its users' personal information unless their demands are met. The interesting part: They're not asking for money.
As smart devices become more prevalent and are used in critical situations, software developers will have to understand that they now have a greater responsibility to keep their software products safe.
Password managers have made the tedious task of managing multiple accounts easier with the use of a single repository of various login credentials locked behind a master password. But what if this, too, gets hacked?
In light of recent incidents that exposed security holes in U.S. government agency systems, President Barrack Obama issued a memorandum mandating the strict use of secure connection protocols on all publicly accessible websites and services.
Indian music streaming service Gaana was temporarily taken offline today and the passwords of all its users reset due to a data breach. Evidently, it was breached by a frustrated hacker who previously reported the vulnerability, but got ignored.