Seven people have been accused by Michigan authorities of pulling off a unique account takeover scheme that targeted Bank of America and involved nearly $360,000 in fraudulent funds transfers.
Banks and the U.S. payments infrastructure are prime targets for international cyberattacks. And it's not just money hackers are after, says Bill Wansley of Booz Allen Hamilton. What else is at risk?
In the wake of recent merchant breaches, a new PCI training program aims to enhance point-of-sale security. Which payment card risks does this program address? PCI Council chair Bob Russo explains.
Heartland Payment Systems, which suffered a massive breach in 2009, is working to enhance POS security at the merchant level. What steps is this processor taking, and what role would it like to see card-issuing banks play?
Two men have been sentenced for defrauding accountholders whose debit cards were compromised in the Michaels point-of-sale breach that hit stores in 20 states. What was their role in an elaborate fraud scheme affecting nearly 100,000 accounts?
Global Payments Inc. says its data breach investigation is complete, and so far the incident has cost the company $84.4 million. What's next for the payments processor as it recovers from this breach?
Security personnel should be required to prove not only that they know how to do things right, but also that they know how to do the right thing. They must demonstrate commitment to ethical behavior.
In the latest update, much was left unsaid about the Global Payments data breach. And if I were a Global customer or card-issuing entity, I'd have some serious follow-up questions.
Blaming developers for application security problems is the wrong thing to do. Here are five reasons why application security development fails in the software development ecosystem of many companies.
Aleksandr Suvorov, linked to Heartland Payment Systems hacker Albert Gonzalez, was sentenced for his role in schemes involving Dave & Buster's restaurants and more than 240,000 stolen credit card numbers.
Medical identification theft is on the rise. Will healthcare reform, as recently affirmed by the Supreme Court, help reverse that trend? Here's why it's difficult to predict the impact of reform.
How well do U.S. financial institutions conform to the FFIEC Authentication Guidance? One regulatory agency discusses the state of conformance and what its examiners have learned from institutions.
A successful organization in today's business world has most likely cultivated a "brand." Have you ever thought about creating your own brand to enhance your career?
In a tribute, we remember Terrell Herzig, information security officer at UAB Health System, an innovator who was passionate about sharing best practices for protecting sensitive information.
Information security isn't just the domain of those branded information security professionals but also requires the knowledge of nearly every other IT occupation as well as individuals in many non-technology jobs, too.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.