The association expects the increased costs incurred in security breaches to come both from traditional areas, such as network cleanup and customer notification, and newer areas such as litigation.
Clarksons, the global shipping firm, has turned the tables on criminal hackers who attempted to extort a ransom payment after stealing confidential information from the company's network.
Exactly how does the attack work and is it expensive to create? The attack, while seeming to be technology voodoo, is actually rather simple. It requires a transmitting relay near the key and a second relay near the car to receive the relayed signals and mimic the key.
Image-hosting website Imgur discovered at the end of last week that hackers broke into its systems in 2014, and stole the account details of some 1.7 million registered users.
Between approximately July 23 and 29, Mesri reportedly engaged in his blackmail campaign. After the TV network didn’t pay the required $6 million in digital cryptocurrency, he began leaking portions of the stolen data on July 30.
Cyber vulnerability hoarding? The US government publishes its Vulnerabilities Equities Policy (VEP) and describes the process by which cyber flaws found by agencies such as the NSA are handled.
The high level of fear of cybercrime dovetails with the self-reported rates of victimization, as 25% of the respondents reported that their personal information or that of their household member has been stolen by hackers over the past 12 months.
Relating the collaboration between ESET experts and the FBI about the Windigo's operation, which ended with the sentencing of Maxim Senakh.
Other cosmetic surgeries who wish to avoid hackers damage their public image would be wise to invest properly in security now, or face the consequences later.
The US Department of Homeland Security and FBI have warned that hackers are actively targeting government departments, and firms working in the energy, nuclear, water, aviation, and critical manufacturing sectors.
Better security of your internet router is one of the simplest ways in which you can cyber-safeguard your home, and the technology you keep there.
The UK National Lottery website and smartphone app are taken offline as a DDoS attack strikes.
Regardless of how Piriform was breached, for a tool as widely downloaded as CCleaner, with a userbase running into the hundreds of millions, there will be a large impact worldwide, even though only the 32-bit version was affected.
Credit reporting agency Equifax has revealed more details of just how many people are affected in the UK, as consumers are warned of the risk of phishing attacks.
Many of the components required to commit cybercrime can be bought and sold online if you know the right part of the internet in which to look.
If you search for cybersecurity or cybercrime under Google News the results can be depressing: so many cybercrimes, so few arrests. But over the past few months law enforcement has begun to strike back.
A leaked document appears to contain the personal telephone numbers and email addresses for actors such as Peter Dinklage, Lena Headey and Emilia Clarke.
Torrents have many legitimate uses, in various segments. However, their popularity among users makes them also into an attractive vector for black-hats.
It seems that Spiderman is in a spot of trouble, tangled in a web of his own making.
A variant of the Erebus ransomware has hit a South Korean web hosting company hard, and disrupted the websites of thousands of businesses.