Retail point-of-sale breaches at Target Corp. and Neiman Marcus have put a spotlight on payment card security and encryption. But achieving true end-to-end encryption isn't easy, says data protection specialist Richard Moulds.
In addition to brute force/scale based attacks, attackers often probe for, and then take advantage of, application vulnerabilities to steal data or pursue financial gain. This means that, in addition to a Web security solution's scale and performance, organizations should consider how architecture and adaptability...
DDoS attacks have undergone significant evolution. On the one hand, they have grown larger. But attackers are also harnessing more sophisticated technologies, such as headless browsers, that enable relatively small, short attacks to go undetected and wreak havoc on a bank's website. Another trend is the blending of...
Now that Sally Beauty Holdings Inc. acknowledges that payment card data was exposed during a recent cyber-attack, experts debate whether the incident is linked to earlier retailer breaches.
Cosmetics supplies retailer Sally Beauty Supply now acknowledges that fewer than 25,000 records containing payment card data were illegally accessed and possibly removed as a result of a network intrusion.
Umpqua Bank is the latest U.S. banking institution to file a class action lawsuit against Target Corp. But what makes this suit stand out from the crowd of litigants? Two attorneys offer their insights.
Security breaches in large enterprises make the headlines, but 55 percent of small and mid-size businesses have also experienced a data breach. And 60 percent of small businesses fail within six months of falling victim to a cyber attack.
This e-book examines the security challenges unique to mid-size...
A study by Verizon finds 86 percent of security breaches come from the outside. Spotting cyber attacks in your network means identifying the signature of known threats. Reputation data takes that one step farther by identifying communications coming from or going to known bad actors based on their...
NoMoreRack.com says there's no evidence to suggest its payments system has been breached, in spite of reports alleging compromised cards have been traced back to some of its retail sales.
The Target retail POS breach is the most talked-about incident in recent memory - and it was entirely preventable with available security solutions, says Adam Tegg CEO of Wontok Solutions.
Target has responded to allegations that it failed to heed an early malware alert before its massive data breach. Experts analyze the very latest developments.
In a preliminary step toward enactment of a new EU data protection law, the European Parliament on March 12 approved a draft proposal for a comprehensive overhaul of the EU's 1995 data protection directive.
Recent retail breaches have exposed security vulnerabilities, highlighting the importance of shifting to much stronger user authentication as well as verification of the authenticity of transactions.
Motivated by idealistic and monetary goals, well-organized hacker groups have set their sights on financial institutions and are attacking with a vengeance - armed with institutional intelligence and striking with unprecedented persistence. Because of this, every financial services company - whether a multi-million...
Attackers likely purchased malware in underground "cybercrime-as-a-service" markets to use in recent credit card breaches, including the Target Corp. attack, a new report from McAfee Labs asserts. Adam Wosotowsky explains the report's findings.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.