The Latest News

  • FFIEC Issues Malware, Attack Alerts

    Regulators Detail Destructive Malware, Cyber-Attack Threats FFIEC Issues Malware, Attack Alerts

    The FFIEC warns U.S. financial institutions that they're at increased risk from attacks that are designed to harvest large amounts of credentials, as well as from destructive "wiper" malware attacks. Read more...

  • China Delays Tough Bank Tech Rules

    Banking Suppliers Would Have to Share Source Code China Delays Tough Bank Tech Rules
    U.S. Treasury Secretary Jacob Lew met with Chinese leaders March 30.

    Chinese officials have reportedly agreed to delay some banking-sector requirements aimed at foreign technology vendors, who were instructed to submit to rigorous audits and to add government-approved backdoors to their products. Read more...

  • PCI Issues Penetration Test Guidance

    Experts Debate Whether Advice Goes Far Enough PCI Issues Penetration Test Guidance

    Experts debate the value of new PCI guidance for how businesses should use penetration testing to identify network vulnerabilities that could be exploited for malicious activity. Does the new advice go far enough? Read more...

  • Fighting U.S. Card Data Fraud Overseas

    Feds Advocate Law Changes to Ease Prosecution of Fraudsters Fighting U.S. Card Data Fraud Overseas

    To help take down global "carding" rings, the U.S. Justice Department wants to expand current law so it can prosecute those who commit fraud anywhere in the world that involves U.S. payment card data. Read more...

  • Why POS Malware Still Works

    Security Experts: It's Too Easy To Infect Retail Systems Why POS Malware Still Works

    New, advanced point-of-sale malware dubbed "Poseidon" can exfiltrate card data directly from every infected device. And security experts warn that too many retailers fail to test POS devices and segment networks to mitigate all malware threats. Read more...

  • Article

    Feds Arrest 'Silk Road' Investigators

    Former Federal Agents Face Fraud, Money Laundering Charges By Mathew J. Schwartz
    Feds Arrest 'Silk Road' Investigators

    The U.S. Department of Justice has charged two former federal agents with money laundering and wire fraud based on allegations that they attempted to profit from the investigation into the underground narcotics marketplace known as "Silk Road."

  • Article

    GitHub DDoS Attack Traces to China

    Disruption Appears to Target Anti-Censorship Tools By Mathew J. Schwartz
    GitHub DDoS Attack Traces to China

    The popular code-sharing website GitHub struggles to mitigate a massive DDoS attack. Security experts say the attack appears to have originated from China and targets GitHub-hosted anti-censorship tools.

  • Article

    Tech Start-Up Slack Technologies Hacked

    Company Rolls Out Two-Factor Authentication Post-Attack By Marianne Kolbasuk McGee
    Tech Start-Up Slack Technologies Hacked

    Slack Technologies, a tech start-up that offers a group chat tool, announces it's rolling out two-factor authentication after hackers breached a database of user profile information.

  • Article

    Cybersecurity Bills: New Developments

    Info-Sharing Bill Advances; Breach Notice Measure Unveiled By Mathew J. Schwartz
    Cybersecurity Bills: New Developments

    The House Intelligence Committee has approved cyberthreat information sharing legislation that its leaders developed. Meanwhile, a national data breach notification bill has been introduced that's modeled on language proposed by the White House.

  • Article

    Breach Notification Bill Advances

    Amendments to Keep Some State Safeguards Rejected By Eric Chabrow
    Breach Notification Bill Advances

    Efforts by some Democratic members of a House subcommittee to amend a national data breach notification bill so that states could retain tougher data security requirements have failed. The measure now advances to a full committee.

More news...

Webinars

  • PREMIUM MEMBER EXCLUSIVE

    Big Data Analytics & Fraud Detection

    Organizations today suffer from data overload. Multiple information systems deliver mountains of data about the latest threats, anomalous activities and potential security incidents. But without the...

  • Securing the Borderless Enterprise

    More and more, the applications that run your business expand beyond your organization's control to cloud-based services and partner-hosted websites. With so many separate sets of credentials and...

More webinars...

White Papers

More whitepapers...
ARTICLE FIDO Specs: Moving Beyond Passwords

Security experts see the FIDO Alliance's release of two universal authentication specifications as...

Latest Tweets and Mentions

ARTICLE FIDO Specs: Moving Beyond Passwords

Security experts see the FIDO Alliance's release of two universal authentication specifications as...

The ISMG Network