The Latest News

  • What is Gov't Role in Info Sharing?

    Researcher Says Private Sector Input Will Hinge on Trust What is Gov't Role in Info Sharing?
    Lance James

    This year could mark a turning point for the sharing of threat intelligence, but only if the government is able to build a framework that instills private-sector trust, says threat researcher Lance James. Read more...

  • Hackers Steal Trading Algorithms

    Attacks Aimed at Hedge Funds, Trading Firms Hackers Steal Trading Algorithms

    Hackers have been stealing the secret trading algorithms that are the lifeblood of many hedge funds and high-frequency trading firms, according to two security companies. What can be done to mitigate the risks? Read more...

  • Police Disrupt Banking Malware Botnet

    But Worldwide Impact of Ramnit Takedown May Prove Temporary Police Disrupt Banking Malware Botnet

    Authorities have disrupted a botnet that was serving up the Ramnit banking malware, which has infected 3 million PCs worldwide. But information security experts warn that the disruption will likely be temporary. Read more...

  • How Faster Payments Could Reduce Fraud

    NACHA CEO Outlines Plan for Stronger Security through ACH How Faster Payments Could Reduce Fraud
    Jan Estep and Joe Proto

    NACHA is already laying the groundwork that will help make the Federal Reserve's faster payment plan a reality while ensuring security and reducing fraud, says Jan Estep, NACHA's president and CEO, in an exclusive interview. Read more...

  • Understanding the Hacker Mindset

    Learning About Motives, Tactics Key to Mitigating Risks Understanding the Hacker Mindset
    Bank of the West's David Pollino

    Learning more about potential attackers and their preferred information targets is one of the best ways organizations can mitigate their cyber-attack risks, says Bank of the West's David Pollino, a featured speaker at ISMG's Fraud Summit LA. Read more...

  • Blog

    EMV Migration: The Merchants Fight Back

    Merchants SayTokenization a Better Long-Term Security Solution By Tracy Kitten
    EMV Migration: The Merchants Fight Back

    Why aren't more U.S. merchants in a hurry to implement EMV? Two national retail association executives answered this question at Information Security Media Group's Fraud Summit in Los Angeles.

  • Article

    Congress Averts DHS Partial Shutdown

    Lamakers Fund the Department for Seven Days By Eric Chabrow
    Congress Averts DHS Partial Shutdown

    Congress, at the 11th hour, passed a bill to fund the Department of Homeland Security for the next seven days, averting for now a partial shutdown that would have curtailed some cybersecurity programs.

  • Article

    Clapper: Cyberthreats to Worsen

    National Intelligence Director Blames Iran for Casino Hack By Eric Chabrow
    Clapper: Cyberthreats to Worsen

    The director of national intelligence, James Clapper, paints a grim picture of the cyberthreats the nation faces, saying as bad as 2014 was, 2015 and the coming years will be worse.

  • Article

    Lenovo Promises: No More Bloatware

    PC Maker Offers Clean Windows Builds, Full Transparency By Mathew J. Schwartz
    Lenovo Promises: No More Bloatware

    Lenovo, the world's largest PC manufacturer, promises to stop preinstalling any software on its Windows laptops that doesn't need to be there. The move comes following security alerts relating to the Superfish adware the company had been preinstalling.

  • Article

    Questioning Gemalto's Reaction to Hack

    Company's One-Week Investigation Downplays the Impact By Mathew J. Schwartz
    Questioning Gemalto's Reaction to Hack

    SIM card manufacturer Gemalto says its investigation into a reported U.S. and U.K. intelligence agency espionage operation found that its internal networks housing encryption keys weren't breached. But security experts question those findings.

More news...

Webinars

  • Secure E-Banking: Consumer-Friendly Strong Authentication

    Strong authentication in an electronic banking environment has always been prone to "security vs convenience" dilemma. Over the years we have witnessed cyber fraud escalate tremendously and watched...

  • PREMIUM MEMBER EXCLUSIVE

    Mobile Fraud

    Mobile has become the new security battlefield in which hackers and businesses are waging the internet-old battle of breach vs. protection. From infiltrating jailbroken devices to decompiling and...

More webinars...

White Papers

  • M-TrendsĀ® 2015: A View From the Front Lines

    Talking about the threat landscape is no substitute for experiencing it first-hand. "M-Trends 2015: A View from the Front Lines," distills the insights gleaned from hundreds of Mandiant incident...

  • 2015 Security Predictions: Another Bumpy Year Ahead

    It was a tough year for CISOs in 2014, and a great year for cybercriminals, as billions of dollars of global economic productivity were siphoned into their hands. It's easy to see that thieves are...

More whitepapers...
ARTICLE China Wants Banking Backdoors

Chinese authorities reportedly want foreign software and hardware vendors that sell to its banking...

Latest Tweets and Mentions

ARTICLE China Wants Banking Backdoors

Chinese authorities reportedly want foreign software and hardware vendors that sell to its banking...

The ISMG Network