The theft of 2 million credentials reminds security professionals that their organizations are at risk because many employees use the same passwords and devices for personal and business purposes, data security lawyer Ronald Raether says.
Akamai's acquisition of DDoS mitigation provider Prolexic Technologies is a sign of how the DDoS-defense marketplace is maturing at a time when attacks are becoming more sophisticated.
Can the two most feared nations in cyberspace finally come to an agreement to stop hacking each other and stealing confidential data? Here's one peace-making approach worthy of consideration.
You can be outraged that the NSA collects Internet communications records of U.S. citizens. But don't be surprised, says sociologist William Staples. This is just one example of our "culture of surveillance."
To improve cyberthreat and cybercrime information sharing, law enforcement officials and business leaders need to develop better working relationships, says federal prosecutor Erez Liebermann.
Federal investigators announced five more arrests this week in connection with a $45 million ATM cash-out and prepaid card fraud scheme. Learn why experts expect these types of crimes to become even more common.
Figuring out how Edward Snowden breached NSA computers is sort of like solving a puzzle. Take public information and match it with an understanding of how organizations get hacked, and the pieces seem to fall into place.
Attorneys discuss the significance of the 10-year prison sentence for hacker Jeremy Hammond, who pleaded guilty in connection with a 2011 breach of Stratfor, a global intelligence firm that provides services to the U.S. government.
U.S. Attorney Steve Wiggington says identity theft, especially linked to card skimming, is still the No. 1 fraud threat facing financial services institutions as well as consumers. He stresses information sharing is critical for fighting fraud.
The breach of a card loyalty marketing company has reignited discussions about the roles banking institutions, regulators and others play when it comes to mitigating third-party risks. Where should the buck stop?
The breach of a card loyalty marketing company that exposed card data and other personally identifiable information illustrates the privacy vulnerabilities third parties pose, experts say.
The same vulnerabilities that have made the online banking channel an easy target for fraudsters also will soon plague mobile banking, says Julie Conroy, a consultant with Aite.
Organizations must guard against making three common mistakes when conducting an investigation of a data breach or fraud incident, says attorney Kim Peretti, a former Department of Justice cybercrime prosecutor.
Information Security Media Group is offering a growing list of fraud-fighting educational opportunities, including videos of presentations at its recent Fraud Summit plus a series of 2014 summits.
The Army Research Laboratory is collaborating with five research universities on a $23 million, 5-year initiative to develop what's being characterized as a new science to detect, model and mitigate cyber-attacks.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.