Reversing recent claims that it was unaware of any data breaches, hotel chain Hilton Worldwide now says it suffered a POS malware infection that affected an unspecified number of hotels, customers and payment cards in 2014 and 2015.
Credit rating agency Moody's Corp. warns that cyber defenses as well as breach detection, prevention and response will be higher priorities in its analysis of the creditworthiness of companies across all sectors, including healthcare and financial services.
Dell is moving to patch a customer-support application preinstalled on many laptops and PCs after security researchers found that it installs a root certificate that could be abused by attackers to intercept private data.
With the heightening of the threat of cyber-attacks to America's critical infrastructure, a congressional watchdog says federal agencies need to adopt better metrics to determine the risks specific to the industries they monitor.
Starwood Hotels and Resorts has confirmed a point-of-sale breach, but card issuers say they don't believe the Starwood breach is isolated, and that fraud patterns indicate that another, perhaps larger breach, is impacting cards across the country.
More than four years after the POS swap attack that struck 80 Michaels craft stores throughout the U.S., details about how the attackers pulled off their scheme have finally emerged. Read why one expert says this was a crime of cash, not cards.
Despite near-constant warnings from law enforcement officials and the information security community, too many organizations still aren't taking security seriously, experts warned at the Irish Cyber Crime Conference in Dublin.
Card-not-present fraud now outpaces card-present fraud in the U.S. by a ratio of 3:1, and is up 30 percent globally since 2014. Experts tell why ecommerce sites need to respond with stronger online authentication, tokenization and behavioral analytics.
Information risk management expert Ron Ross is evangelizing a new way to secure IT that adopts an engineering approach to build trustworthy and resilient information systems.
The moment a successful defense is deployed, attackers find new ways to break into networks. In this video interview, Dr. Dale Meyerrose describes the damage wreaked by APTs and the strategies organizations can use to keep attackers at bay.
Among the top challenges to security leaders is turning a deluge of information into threat intelligence. To make that conversion, companies must identify and remediate the potential threats in their environments, says Ajay Nigam of BrightPoint Security.
In this video interview, former Equifax senior vice president Andy Smith examines the types of scams fraudsters are attempting in the wake of the US EMV liability shift, as well as the countermeasures financial institutions can take to derail them.
Flaws highlighted by researchers at Black Hat Europe could be used to bypass self-encrypting drives' crypto, defeat Windows BitLocker, fool self-driving cars, mess with oil and gas ERP systems and more.
A government audit of Internal Revenue Service financial statements reveals deficiencies in internal information security controls, including missing security updates, insufficient audit trails and monitoring for certain key systems and use of weak passwords.
The continuous integration tools that many software developers rely on are often misconfigured or lack security controls, thus putting code at risk, security expert Nikhil Mittal claims at Black Hat Europe.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.