Understanding the encryption options
When it comes to protecting data, it’s rarely as simple as “encrypt it all, all the time” Read full article at FCW
Understanding the encryption options Read More »
When it comes to protecting data, it’s rarely as simple as “encrypt it all, all the time” Read full article at FCW
Understanding the encryption options Read More »
Crooks stole $12.7 million at 1,400 Japanese ATMs earlier this month, with around 100 people making 14,000 transactions with 1,600 counterfeit credit cards based on stolen information from real cards issued by a South African bank.
The theft could …
Second-factor may prevent ATM fraud Read More »
When consumers log into their online banking accounts, is there anything that their bank might do to ensure that the person’s computer is free from keyloggers, viruses and other malware?
Extra Free Security: Banks provide customers with additional security software Read More »
Last week, the chair of the Securities and Exchange Commission called cybersecurity the biggest risk facing the global financial industry.
“Cyber risks can produce far-reaching impacts,” said SEC chair Mary Jo White.
For example, cybercriminals rec…
Regulators: cybersecurity poses biggest risk to global financial system Read More »
Most enterprise users with Android phones are still vulnerable to an exploit that allows attackers to get into their phone’s Qualcomm Secure Executive Environment and completely take over the phone, up to and including modifying the phone’s operatin…
60% of enterprise phones still vulnerable to QSEE exploit Read More »
Cybercrime may be booming but its business model is vulnerable on many fronts, according to a new report.”We’ve been observing that they’ve been acting like a business for a while,” said Shogo Cottrell, security strategist at Hewlett Packard Enterpr…
Cybercriminal business model vulnerable to intervention Read More »
Although cybercriminals have been turning out specialized hacking and attack tools at a rapid pace, terrorists are often using legitimate, consumer-focused technologies, according to a new Trend Micro report.”They’re abusing legitimate technology fo…
Terrorists opt for consumer tools Read More »
The percentage of health care data breaches due to criminals has risen from 20 to 50 percent since 2010, but health care organizations are failing on defense, according to a new study.
On average, the percentage of health care organizations hit by …
Criminals taking a bigger bite of health breaches Read More »
The PCI Security Standards Council now requires better authentication, encryption and penetration testing by companies that accept consumer payments, improvements lauded by security experts.
“There are a lot of people who consider compliance to be policy for policy sake,” said Ryan O’Leary, vice president of the threat research center at WhiteHat Security. “But with these three recommendations, it is really security-industry standards that are finally being forced upon companies. I would say, absolutely, it will move the bar forward as far as security goes.”
Administrators with access to card data must now have two-factor authentication when they log in, either locally or remotely.
To read this article in full or to leave a comment, please click here
Retailers must upgrade authentication, encryption and pen testing Read More »
According to the most recent Verizon data breach report, a phishing email is often the first phase of an attack. That’s because it works well, with 30 percent of phishing messages opened, but only 3 percent reported to management.
But when employee…
10 companies that can help you fight phishing Read More »
Data encryption addresses four major areas: data in motion, data stored on user devices, data stored on servers and data that is currently being used. Today, most encryption efforts focus on data stored on servers because that is where the majority of big breaches take place. “There are lots of different challenges,” said Sol Cates,
Protecting data wherever it lives Read More »
IT managers know the movies get it wrong. A teenager with a laptop cannot crack multiple layers of encryption.
The encryption challenge Read More »
Peak-time distributed denial-of-service attacks cost organizations more than $100,000 per hour, said half of the respondents to a new survey of mid-sized and large corporations in the U.S. and Europe.And for a third of respondents, the average peak …
DDoS costs, damages on the rise Read More »
Peak-time distributed denial-of-service attacks cost organizations more than $100,000 per hour, said half of the respondents to a new survey of mid-sized and large corporations in the U.S. and Europe.And for a third of respondents, the average peak …
DDoS costs, damages on the rise Read More »
Facebook’s Messenger app has allowed users to send money to friends using their debit cards since last spring, but recent reports indicate that Facebook may be considering a move into the retail payments space as well, following in the tracks of App…
Security pros concerned about Facebook payment expansion Read More »