The bill would ban businesses from storing sensitive payment data, for any long than required, even if it is encrypted.
After suffering a massive bitcoin theft, the exchange faces liquidation of its assets in Japan.
According to the U.S. Government Accountability Office (GAO), SEC, among other lapses, failed to adequately oversee a contractor, which migrated its financial system to a new data center.
A federal appeals court backed an earlier ruling penalizing the email service.
Critical security issues that leave satellite communications vulnerable to being intercepted, manipulated or blocked were detailed in a white paper.
The possibly foreign malware affected all computer systems and left little for investigators to work from because it was designed to self-destruct.
Defense Secretary Chuck Hagel recently announced the recruitment efforts during a speech in Fort Meade, Md.
The law, Wis. Stat. Section 995.55, was enacted last week.
After a Kentucky bill passed on Thursday, only three states remain that do not have any data breach notification laws.
After a Bloomberg article reported that unnamed sources indicated that the NSA knew of the major flaw and utilized it for surveillance purposes, the agency denied the claims.
A federal appeals court determined that New Jersey was the wrong venue to convict and sentence AT&T hacker Andrew "weev" Auernheimer.
This week, critical infrastructure operators were notified of potential threats arising from the critical OpenSSL flaw.
Introduced Tuesday, the Digital Privacy Act includes stiff penalties for organizations that fail to adequately respond to breaches.
Efforts are now reportedly underway in Iowa and North Carolina as part of a multistate probe.
The court battle began when the FTC filed a 2012 complaint against hotelier Wyndham, accusing it of deceptive and unfair practices against consumers following data breaches.
Under the reforms, state and local law enforcement must obtain search warrants to access electronic devices' location information and electronic communications content.
The breach struck Experian subsidiary, Court Ventures, and compromised the personal and financial data of more than 200 million Americans.
Google paid more than $1 million to Italy after a regulator found the company's Street View cars violated citizens' privacy by taking photos without their knowledge and permission.
Researchers have uncovered an NSA tool, known as "Extended Random," that enables the government agency to more quickly crack a flawed community-developed encryption algorithm.
In this month's debate, experts discuss whether whistleblower Edward Snowden should be granted amnesty.
The companies were accused of failing to securely transmit credit card data, Social Security numbers, and other sensitive data collected by their mobile apps.
Sony and its insurer Zurich were embroiled in an immunity lawsuit for years.
Of the respondents participating in a just released survey, 33 percent indicated that they are less likely to adopt the cloud due to fears of government surveillance.
University President Wallace Loh told Senate members that the attackers cloaked their activity by using the Tor network.
On Wednesday, a court in Ankara, Turkey overturned the government's ban on Twitter, according to a report by The New York Times.
Along with the White House's legislative proposal, the House Intelligence Committee also introduces its own bill tackling the NSA surveillance practice.
Federal officials notified more than 3,000 U.S. companies in 2013 that their computer networks were compromised, according to a report by the Washington Post.
Recent Snowden leaks allege that the NSA targeted Chinese telecom firm Huawei for corporate data, including product source code.
The CEOs of Netflix, Dropbox, Facebook, Palantir and Boxs, as well as the executive chairman of Google, met with President Obama to vent concerns over government surveillance efforts and their repercussions in the tech industry.
Snowden leaks detail the agency's practice of going after the gatekeepers of networks to gather intel.
According to reports, the Turkish Prime Minister vowed in a speech to "eradicate Twitter."
On Thursday, California Attorney General Kamala Harris released the 118-page report on international criminal groups targeting the state.
The Privacy and Civil Liberties Oversight Board plans to release a report on government programs later this year, and hosted a public meeting to kick off its research.
In the case, plaintiffs accused Google of illegally scanning the contents of Gmail users' emails for targeted advertising purposes.
An Army combat commander seeking to test employee awareness of phishing emails failed badly when he sent one out on his own and caused mass confusion - but no staffers fell for the fake scam, making it something of a success.
The software and IT services giant published an open letter to its clients on Friday.
In addition to phoning President Obama, Facebook's CEO published his thoughts on the social networking site.
On Friday, the hacktivist group threatened to release the data, including "hundreds of documents" it obtained, in coming days.
On Thursday, Kevin Charest, the U.S. Department of Health and Human Services CISO, spoke to SCMagazine.com about the new initiative.
The data laws passed a Parliament vote and now the 28 European Union members must give their accord.
Sen. Dianne Feinstein divulged the information during a Tuesday speech on the Senate floor.
The NSA is using an automated system to infect millions of computers across the globe with malware that will enable all sorts of advanced surveillance, according to a report by The Intercept, based on Snowden documents.
The Federal Trade Commission approved the final order on Tuesday, settling charges launched against rent-to-own chain Aaron's.
A federal judge ordered the National Security Agency (NSA) to stop destroying millions of phone records until at least March 19.
The Albertan Information and Privacy Commissioner has formally asked the government to amend the province's Health Information Act with mandatory breach reporting and notification measures.
The NSA had requested that the court extend the retention period for phone records obtained through its controversial surveillance program.
Brown, a writer and activist who is known as one of the online faces of Anonymous, faced charges related to sharing a link to a dump of credit card numbers connected to the Stratfor breach.
A police department used a "stingray" cell phone tracking device without a judge-issued warrant to pinpoint a suspected criminal's location.
Privacy experts held a candid talk on government methods for obtaining citizen information, and on how the industry can help buffer unfettered data collection.
In light of the RSA-NSA controversy, a number of speakers, who originally planned to speak at RSA Conference 2014, pulled out and formed a lineup for TrustyCon.
Cyber security guru Richard Clarke and General Michael Hayden discussed the much-maligned NSA spying program during the RSA Conference.
Christopher Soghoian, of the ACLU (American Civil Liberties Union), concluded his speech at BSides San Francisco with the observation that developers building encryption models need to consider the US government a threat.
Richard Clarke kicked off the CSA Summit 2014 by discussing his observations about the NSA surveillance controversy.
The need for cyber threat intelligence sharing is still vital, and with Congress sidelined, it's going to take leadership from the nation's corporate executives to make progress on this issue within the framework of our current laws.
On Wednesday, NIST published the 41-page guidance after months of feedback from the community.
Northern Ireland's Department of Justice has been handed a fine of more than $240,000 by the Information Commissioner for a data breach that involved the personal information of terrorist attack victims.
Whistleblower Edward Snowden used a simple and low-cost web crawler to tap into the troves of government data he leaked.
The new security implementation would be mandatory by Jan. 1, 2015. All phones sold in California after that date would have to have a kill switch installed.
Following the new rules regarding transparency reports by Department of Justice, the social media giant believes further information should be shared, and may seek legal options to protect its First Amendment rights.
Google must post a notice on its French homepage stating that it has been fined more than $200,000 for privacy violations.
A new bill approved by Turkish Parliament will ensure government control over the internet.
An NBC News reporter set up two laptops and a smartphone in Russia to demonstrate Olympics cyber threats.
U.S. intelligence agencies were concerned that developers, with ties to Belarus, helped "produce the website," The Washington Free Beacon reported.
The Bank of England has released the results of Waking Shark II, a Nov. 12, 2013, four-hour simulated cyber attack in London involving hundreds of financial institutions that was designed to test the city's cyber security readiness.
In a Tuesday report, Sen. Tom Coburn noted numerous government oversights pertaining to securing sensitive data and critical infrastructure operations.
A security firm highlighted the ways that U.S. defense contractors have reassessed their security programs to stave off insider threats.
European hacker association Chaos Computer Club is suing the German government for allegedly breaking the law and aiding foreign intelligence agencies to spy on citizens.
A group of technology industry experts will meet this Thursday to discuss facial recognition technologies and take the first steps toward establishing guidelines for future technology.
After winning a battle against the U.S. Department of Justice, some of the biggest technology and internet corporations began releasing updated transparency reports on Monday.
The continued leak of classified government intelligence documents by Edward Snowden draws into question the balance of offensive and defensive capabilities of governments.
Global consensus on data breach legislation is still evolving, but fear of brand damage is pushing reform, reports James Hale.
After a quiet year on the advanced malware front, we could soon see more activity, says the Atlantic Council's Jason Healey. Karen Epper Hoffman reports.
This time, Snowden leaks reveal the spy tactics of a communications intelligence agency in Canada, which leveraged Wi-Fi in a major airport to track travelers' comings and goings.
The FBI alerted Ohio-based State Industrial Products that the personal information of an undisclosed number of current and former employees may be at risk.
The U.S. Department of Justice is investigating retail chain Target's recent data breach. U.S. Attorney General Eric Holder confirmed the department's involvement in a Senate Judiciary Committee hearing.
The National Security Agency hired its first privacy and civil liberties officer this week in response to an order from President Obama.
The news comes in response to November claims that Parliament members' communications were being monitored by U.S. spies.
The news comes soon after President Obama called for the government to be more forthcoming about requests it makes for service provider data.
The FBI has arrested five United States email hacking operators and customers as part of a worldwide operation involving Romania, India and China.
Widely used apps, like Angry Birds, and mobile platforms for Facebook, Twitter and other social networking services, were a target for the NSA, leaks reveal.
An advanced remote access trojan known as Xtreme RAT has been identified by Seculert Research Lab as the malware used in an attack on Israeli organizations that impacted 15 machines.
Edward Snowden's stay in Russian could be longer than expected after a Russian legislator alluded to the country possibly extending his asylum.
Verizon is the first major carrier to publish a transparency report detailing federal, state and local requests for user data.
The Federal Trade Commission has charged 12 companies with falsely claiming to comply with the U.S.-EU Safe Harbor Framework.
Researchers have revealed that Russia is behind hundreds cyber espionage campaigns targeting American, European and Asian companies.
The Department of Veterans Affairs eBenefits website experienced a software defect that possibly resulted in a compromise of medical and financial information.
On Friday, President Obama gave his attorney general and the NSA 60 days to determine how the trove of phone data will be held moving forward.
Target, as well as law enforcement officials and other witnesses, will testify in front of the Commerce, Manufacturing, and Trade subcommittee in the first week of February to discuss data breaches and their effect on consumers.
The National Cybersecurity and Critical Infrastructure Protection Act of 2013 was introduced last month in a bipartisan effort by four lawmakers.
Anyone designing a new system such as this should take security into account from the beginning. The amount of personal information that could be harvested by any breach is truly alarming.
In the study, 31 percent of respondents admitted to using public Wi-Fi on work-related mobile devices, while 52 percent failed to use multi-factor auth or data encryption methods to secure data.
Classified government documents revealed how the intelligence agency even targets computers not connected to the internet.
The House of Representatives banded together to pass the Health Exchange Security and Transparency Act, which mandates two-day notification where PII is compromised under the Patient Protection and Affordable Care Act.
National Security Agency surveillance has done little to stop terrorism, according to a study released on Monday by New America, a public policy institute.
A year after his suicide, eight lawmakers have tapped the Department of Justice about unanswered questions regarding Aaron Swartz's "aggressive prosecution."
President Barack Obama met yesterday with senior lawmakers to discuss ending the National Security Agency's surveillance of Americans' telephone records.
Credo Mobile published its transparency report before major carriers Verizon and AT&T, which claimed reports from its companies would come early this year.
State agencies would be banned from helping warrantless snooping, along with corporations that provide services to the state of California.
A Vermont senator has once again brought a bill to Congress that, if passed, would establish a national standard for data breach notification, as well as toughen up penalties for computer hacking crimes.
The RSA Conference is set to convene the last week in February, but several respected researchers and experts have canceled their appearances.