The compromise of bank cards at two banks in New Zealand has garnered attention to the growing ATM fraud trend. What are the banks and law enforcement doing to address the losses?
In its second formal statement about its data breach, payments processor Global Payments Inc. says this incident is confined to North America and involves fewer than 1.5 million payment cards.
In the wake of the Global Payments Inc. card breach, ID theft expert Neal O'Farrell says banks and credit unions must be proactive with outreach to customers. What should institutions' messages include?
IPv6, known to some as the new Internet, is architected to be safer than IPv4, but that doesn't mean organizations shouldn't take steps to assure the security in Internet Protocol version 6, American Registry for Internet Numbers' John Curran says.
"If they can do it against RSA, that makes most of the other companies vulnerable," says Army Gen. Keith Alexander, the military's Cyber Command commander and National Security Agency director.
Technology is only part of the solution. To truly combat phishing, banking institutions need to address a trickier part of the equation. They need to change human behavior. Here are experts' tips.
Payments processing firm Global Payments Inc. has confirmed its role in a data breach that could prove to be the largest such incident since the Heartland Payment Systems breach.
The Global Payments Inc. breach could be one of the four largest card-related incidents in recent years. Here's a look at three other major payment card breaches.
As enterprises spend frugally on IT security, cybercriminals aren't, and that presents big problems for organizations working feverishly to secure their digital assets, says Steve Durbin, global vice president of the Information Security Forum.
The Paul Allen card breach reiterates a concern financial fraud experts have been screaming about for years: Socially-engineered schemes that compromise employees. So, what can institutions do about them?
Today's threat landscape is challenging enough. But what happens when organized crime adopts the techniques developed by hacktivists? Learn more about the top 10 threats to security by 2014.
Information Security Media Group announces the launch of two new weekly newsletter tracks representing its DataBreachToday and InfoRiskToday media sites. Click for details on how to subscribe.
The FTC proposes that privacy protections be built at every stage in developing online products and consumers be given the option to decide what information is shared about them and with whom through a do-not-track system.
Increasingly, social engineers target unwitting insiders to plunder organizations' financial and intellectual assets. How can you prevent these and traditional inside attacks? CMU's Dawn Cappelli offers tips.
Components manufactured overseas that go into IT products used by the U.S. government could be exploited by foreign intelligence agents to degrade the security of critical federal government networks and data, the GAO reports.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.