The Trump administration has moved to restrict the U.S. government's ability to use products built by Moscow-based anti-virus firm Kaspersky Lab, which claims it's been caught up in a "political game" being played out between Washington and Moscow.
The recent WannaCry ransomware campaign has led to more healthcare organizations paying closer attention to cybersecurity and the latest threats, says Lee Kim of the Healthcare Information and Management Systems Society.
Trump Hotels is warning customers that payment card data at 14 of its properties was compromised during a seven-month breach that affected service-provider Sabre. Other affected chains include Hard Rock Hotel & Casino and Loews Hotels.
The workforce of information security analysts in the United States has exceeded 100,000 for the first time, more than doubling since the Department of Labor's Bureau of Labor Statistics began publishing full-year statistics for the occupation category in 2012.
Russian-born Alexander Tverdokhlebov has been sentenced to serve nine years in U.S. prison after pleading guilty to causing damages of between $9.5 million and $25 million by running botnets, using malware to steal payment card data, selling "dumps" of that data as well as hiring money mules.
The latest edition of the ISMG Security Report leads off with a multi-part report explaining why President Donald Trump sought to create a joint U.S.-Russian cybersecurity unit and then backed off. Also, ransomware's impact on emergency services providers.
Analytics can play a critical role in cracking down on identity fraud, says Shaked Vax, Trusteer products strategist at IBM Security, who explains how to use the latest tools to identify network intruders.
Good news for some ransomware victims: The master key used to encrypt the original versions of Petya ransomware has been released. But the key cannot be used to decrypt the "NotPetya" malware that recently began crypto-locking PCs.
In the wake of the reported FBI probe into Moscow-based Kaspersky Lab, here's a question: Could a government compel a domestic cybersecurity firm to ignore state-sponsored malware, or even add backdoors to its software or hardware products, without getting caught?
Faster payments can help to make payments more secure, but they can also raise new security issues. How can those be mitigated? Ed O'Neill of the Federal Reserve provides an update on the activities of two task forces working on this and other issues.
Police in Ukraine have seized servers operated by the Intellect Service, which develops the M.E. Doc accounting software used by 80 percent of Ukrainian businesses. Attackers backdoored the software to launch XData, NotPetya and fake WannaCry - aka FakeCry - malware campaigns.
A senior Russian government official warned that Moscow will retaliate if the Senate moves to ban the use of Kaspersky Lab software by government agencies. Meanwhile, CEO Eugene Kaspersky has repeated his offer to allow U.S. officials to review the company's source code.
The NotPetya outbreak - and XData ransomware before it - have been traced by security researchers at ESET to backdoored M.E. Doc accountancy software. The installed software contains a unique tax identification code for each user's organization, potentially aiding attackers.