Eight defendants have been charged in an alleged identity theft fraud scheme involving the theft of personal information from a call center for use in unauthorized wire transfers and to obtain payment cards.
In many if not most enterprises, the chief information security officer reports to the chief information officer. After all, enterprises cannot function without IT, and security is a support function to safeguard data and systems. Or is it?
The fear of fraud and lack of trust in the online channel are the primary reasons why some Latin American consumers avoid Internet banking. This is just one of the key findings from Easy Solutions' fourth annual study of Latin American consumers and the online channel.
Three more banks have filed a class-action lawsuit against Target and security firm Trustwave in the wake of the retailer's 2013 data breach. Meanwhile, two other banks have dropped their separate suit against the retailer and the vendor.
An analyst says two guilty pleas by defendants who played leading roles in an international account takeover and ATM cash-out scheme worth more than $15 million were not surprising because of the strong evidence in the case.
The FFIEC has issued notices spelling out its expectations for the steps that financial institutions should take to mitigate risks posed by ATM cash-out schemes and the continued DDoS attacks on public-facing websites.
Houston-based liquor store chain Spec's says its network was attacked by malware back in October 2012, and the intrusion, which exposed card data and other information, may have continued until as late as March 20, 2014.
Advanced threats are like the weather. Everyone talks about them, but few have a solid defense plan - or even a solid understanding of the threat landscape. Mike Nichols of General Dynamics Fidelis Cybersecurity Solutions offers insight.
An analysis of the Target breach prepared for a Senate committee is a political document that might help its patron's agenda but doesn't go far enough to identify technical solutions to help enterprises avoid Target-like breaches.