The NSA, in a highly classified program code-named Bullrun, used supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine encryption, according to a news report.
Citi's settlement with two states over a breach that exposed 360,000 cards will likely set an example for other states. One expert says banking institutions will likely pay more damages when accounts are compromised.
International markets that have implemented EMV technology are seeing reductions in card fraud, but non-EMV markets are seeing dramatic upticks, says U.K.-based card fraud expert Neira Jones.
The massive initiative to deploy continuous monitoring at U.S. federal government agencies will be done in phases, with the initial rollout occurring over three years, the Department of Homeland Security's John Streufert says.
Iris scanning is becoming old hat for authenticating individuals entering secured facilities or crossing international borders, but it remains several years away for use in providing access to IT systems.
As the federal government ramps up deployment of continuous monitoring, agencies should significantly reduce the time to certify and accredit IT systems and detect vulnerabilities, says the Defense Department's Robert Carey.
Many banking institutions have done a poor job of addressing call-center fraud, says IDC analyst Jerry Silva, who offers tips on addressing the challenge of balancing customer service with security.
Operators of media sites should consider adoption of the cybersecurity framework in the aftermath of the recent domain name systems attacks aimed at The New York Times and Twitter.
A new cross-device malware strain that has been linked to last year's High Roller attacks is defeating dual-factor authentication. Experts explain why banking institutions worldwide should be on alert.
Organizations incorporating social media into their daily operations tend to have gaps in policies, and key aspects are often an afterthought, says attorney David Adler, who pinpoints areas to address.
Can roaming services be used successfully as a backup for mobile networks that fail? It's a new idea being explored by the European Network and Information Security Agency. What are the pros and cons?
The theft of four unencrypted computers from a Chicago area medical practice may affect 4 million patients. But the big question is: Why do breaches involving unencrypted computer devices still occur?
A malware attack that exploited a point-of-sale vulnerability of a select group of Kentucky and Southern Indiana retailers has now been linked to attacks against Schnuck Markets Inc. and four other merchants.
The National Institute of Standards and Technology has issued new guidance for designing cryptographic key management systems that describes topics designers should consider when developing specifications.
To address the insider threat, Jeremy Walczak of Independent Health is using a privileged identity management system. Walczak and other experts offer detailed insights on mitigating emerging threats.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.