The Latest News

  • Fighting U.S. Card Data Fraud Overseas

    Feds Advocate Law Changes to Ease Prosecution of Fraudsters Fighting U.S. Card Data Fraud Overseas

    To help take down global "carding" rings, the U.S. Justice Department wants to expand current law so it can prosecute those who commit fraud anywhere in the world that involves U.S. payment card data. Read more...

  • Why POS Malware Still Works

    Security Experts: It's Too Easy To Infect Retail Systems Why POS Malware Still Works

    New, advanced point-of-sale malware dubbed "Poseidon" can exfiltrate card data directly from every infected device. And security experts warn that too many retailers fail to test POS devices and segment networks to mitigate all malware threats. Read more...

  • Target Settlement: What About Banks?

    Assessing Impact on Pending Lawsuit Filed by Banks Target Settlement: What About Banks?

    Target Corp.'s pending settlement of a consumer class action lawsuit is more about public relations than compensating victims, some observers say. But will it have an impact on a pending suit filed by banks? Read more...

  • FFIEC to Prepare New Cyber-Risk Policy

    Regulators Reveal More Cybersecurity Initiatives FFIEC to Prepare New Cyber-Risk Policy

    The FFIEC says it's taking several additional steps, including updating and supplementing its Information Technology Examination Handbook, to help banking institutions enhance their cybersecurity risk preparedness. Find out the details. Read more...

  • Regulator Issues New Phishing Alert

    Latest Campaign Pretends to be Request from Agency Regulator Issues New Phishing Alert

    A federal banking regulatory agency has issued a warning about a new phishing campaign that aims to con consumers into disclosing personal and financial details by feigning to be a request from the regulator. Read more...

  • Article

    Tech Start-Up Slack Technologies Hacked

    Company Rolls Out Two-Factor Authentication Post-Attack By Marianne Kolbasuk McGee
    Tech Start-Up Slack Technologies Hacked

    Slack Technologies, a tech start-up that offers a group chat tool, announces it's rolling out two-factor authentication after hackers breached a database of user profile information.

  • Article

    Cybersecurity Bills: New Developments

    Info-Sharing Bill Advances; Breach Notice Measure Unveiled By Mathew J. Schwartz
    Cybersecurity Bills: New Developments

    The House Intelligence Committee has approved cyberthreat information sharing legislation that its leaders developed. Meanwhile, a national data breach notification bill has been introduced that's modeled on language proposed by the White House.

  • Article

    Breach Notification Bill Advances

    Amendments to Keep Some State Safeguards Rejected By Eric Chabrow
    Breach Notification Bill Advances

    Efforts by some Democratic members of a House subcommittee to amend a national data breach notification bill so that states could retain tougher data security requirements have failed. The measure now advances to a full committee.

  • Article

    Another Info-Sharing Bill Introduced

    Latest Measure Addresses Liability, Privacy Concerns By Eric Chabrow
    Another Info-Sharing Bill Introduced

    Add the Protecting Cyber Networks Act to the growing list of cyberthreat information sharing legislation pending before Congress. Lawmakers are now considering four measures, all designed to help thwart data breaches.

  • Blog

    Google's Psychological Patch Warfare

    'Project Zero' Rewrites Vulnerability Disclosure Norms By Mathew Schwartz
    Google's Psychological Patch Warfare

    Psychologically speaking, nothing beats the power of a well-timed deadline. And love it or hate it, Google's 90-day "Project Zero" deadline for fixing flaws - before they get publicly disclosed - has rewritten bug-patching rules.

More news...

Webinars

More webinars...

White Papers

  • Win the Race Against Time to Stay Ahead of Cybercriminals

    Of all the questions organizations face in protecting against cyber attacks, one may be paramount: How long does it take to thoroughly investigate a security incident? Ideally, the answer should be...

  • Data Capture and Network Forensics

    The ability to capture, consume and correlate multifaceted data from all over the enterprise is a growing need. No single data source or type can provide sufficient forensic capabilities to solve all...

More whitepapers...
ARTICLE Financial Sector Terrorism Threat Grows

Security experts warn of an increased risk that terrorists will disrupt the financial sector via...

Latest Tweets and Mentions

ARTICLE Financial Sector Terrorism Threat Grows

Security experts warn of an increased risk that terrorists will disrupt the financial sector via...

The ISMG Network