While P.F. Chang's China Bistro has warned customers that their card information may have been compromised in a data breach, several fraud experts say they have yet to see a related increase in fraud. Learn the latest developments.
A new study shows the accuracy of facial recognition algorithms has markedly improved over the past three years, though one of the report's authors suggests they're not at the level to be a highly reliable form of authentication.
Kentucky is now the 47th state to enact a breach notification law. While a national law superseding the widely varying state statutes is long overdue, the primary election defeat of House Majority Leader Eric Cantor makes passing such a bill tougher.
Restaurant chain P.F. Chang's China Bistro confirms it suffered a data breach that compromised credit and debit card numbers used by an unknown number of patrons. Some experts see a Target connection.
While more organizations have breach response plans in place, many are not testing these plans - or are doing a subpar job of conducting tabletop exercises, security experts say.
Although restaurant chain P.F. Chang's has not yet confirmed a breach, several researchers say they believe the chain suffered a malware attack similar to those that compromised Target, Neiman Marcus and Sally Beauty.
In recent days, three companies experienced distributed-denial-of-service attacks that resulted in significant website downtime. Find out how the organizations are mitigating the impact of the cyber-attacks.
Restaurant chain P.F. Chang's China Bistro says it's investigating a possible payments breach that has been linked to fraud. Card issuers say the compromise could date back to March.
In the wake of its massive data breach, Target Corp. has hired as its first CISO an executive with information security leadership experience at two of the nation's largest corporations.
A second economic espionage campaign has been tied to a Chinese military hacking team. But does that attribution help businesses, or just highlight security firms battling for government cybersecurity spending?
When NIST issued "Guidelines on Cell Phone Forensics" in May 2007, Apple's introduction of the iPhone was a month away. Seven years later, NIST is revising its guidance and giving it a new moniker, "Guidelines on Mobile Device Forensics."
We've been talking about shifting away from legacy mag-stripe technology and a move toward EMV chip cards for the last decade in the U.S. So is it too late, or is there still hope for EMV?
Luxury retailer Neiman Marcus is searching for its first CISO following the company's major data breach last year. Security experts weigh in on the attributes of ideal candidates and offer advice for how they should tackle the job.
During a video interview with Information Security Media Group, FireEye's SVP and COO, Kevin Mandia, details the three stages of advanced threats; attractive nuisances, criminal activity, and nation-state activities.
U.S. Forces Korea is notifying 16,000 employees that their personally identifiable information was potentially stolen from two compromised databases. Find out what information was exposed.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.