The Latest News

  • ID Fraud Drops for First Time Since 2010

    But Javelin Says Mere 3% Decline Is Disappointing ID Fraud Drops for First Time Since 2010
    Al Pascual

    ID fraud reported by U.S. consumers dropped 3 percent in 2014 - the first decline since 2010, according to Javelin. But analyst Al Pascual says the decrease should have been much greater. Read more...

  • OCC Expands on Third-Party Cyber-Risks

    Director Offers Review of New Cyber-Resiliency Guidance OCC Expands on Third-Party Cyber-Risks

    Kevin Greenfield, director of bank IT for the Office of the Comptroller of the Currency, says FFIEC agencies are working to help financial institutions shore up cybersecurity, and a big focus for regulators is third-party risks. Read more...

  • Fed, State Regulators: Reform Is Needed

    OCC, NY DFS Call for Better Standards, Info Sharing Fed, State Regulators: Reform Is Needed
    Thomas Curry and Benjamin Lawsky

    Banking institutions' technical and procedural shortcomings pose increasing risks to the nation's critical infrastructure, two banking regulators note. Learn why they say more transaction monitoring and information sharing are needed. Read more...

  • Apple Pay: Authentication a Soft Spot

    Mobile a Breeding Ground for Counterfeit Card Fraud Apple Pay: Authentication a Soft Spot

    New exploits linked to Apple Pay aren't compromising the mobile device's security, but instead are taking advantage of lax authentication practices used by banking institutions to verify cards that are loaded to the iPhone for Apple Pay purchases. Read more...

  • What is Gov't Role in Info Sharing?

    Researcher Says Private Sector Input Will Hinge on Trust What is Gov't Role in Info Sharing?
    Lance James

    This year could mark a turning point for the sharing of threat intelligence, but only if the government is able to build a framework that instills private-sector trust, says threat researcher Lance James. Read more...

  • Blog

    Clinton's Email Brouhaha and Politics

    Coverage Focus Segues from Secrecy to Security By Eric Chabrow
    Clinton's Email Brouhaha and Politics

    Word that Hillary Clinton maintained a personal email server while secretary of state has elevated cybersecurity and privacy as political issues. But it's just the latest example of such issues grabbing the attention of U.S. voters.

  • Article

    Could Costs Impede Info-Sharing Plan?

    Scrutinizing Obama's Cyberthreat Information Sharing Strategy By Eric Chabrow
    Could Costs Impede Info-Sharing Plan?

    Small and mid-size businesses might not be able to afford participating in voluntary programs to share and receive cyberthreat information, as President Obama has proposed, industry representatives tell Congress.

  • Article

    Apple, Android Prep 'Freak' Fix

    Exploiting Crypto Flaw Breaks HTTPS on Devices, Sites By Mathew J. Schwartz
    Apple, Android Prep 'Freak' Fix

    Many Apple and Android devices are vulnerable to a TLS/SSL "Freak" flaw, which could be exploited to subvert secure Web connections. The flaw is a legacy of U.S. government export restrictions on strong crypto.

  • Article

    Reversal of Fortune: DHS Funding OK'd

    Boehner Persuades Enough GOP Lawmakers to Back Measure By Eric Chabrow
    Reversal of Fortune: DHS Funding OK'd

    Congress has voted to fund the Department of Homeland Security through September, the end of the fiscal year, averting another threatened shutdown that would have curtailed some cybersecurity programs.

  • Article

    Anthem Attribution to China: Useful?

    Report Links Breach to Chinese Professor; Experts Respond By Mathew J. Schwartz
    Anthem Attribution to China: Useful?

    A new report details new clues suggesting that the massive data breach involving health insurer Anthem was launched by Chinese hackers. But will such evidence help businesses blunt future APT attacks?

More news...

Webinars

  • Malware, Crimeware and Phishing - In Depth Look at Threats, Defenses

    The evolution of malware and crimeware has produced more insidious and harmful intrusions to networks and systems. This webinar will show how these types of intrusions relate to phishing and will...

  • PREMIUM MEMBER EXCLUSIVE

    Identity Theft vs. Identity Fraud

    Our risk-based system of identity proofing in business and commerce - on top of the rapid advance of technology -- has resulted in the development of sophisticated first-party fraud where identities...

More webinars...

White Papers

  • HP Cyber Risk Report 2015: Executive Summary

    The headlines show us any business can become a victim of cyber crime. To fight back, we need to understand the vulnerabilities that exist in IT infrastructure and applications and how hackers...

  • HP Security Research: Cyber Risk Report

    Today's cyber world is an evolving landscape of known vulnerabilities and exploits coupled with new threats brought by new technologies. Security professionals must learn to protect their businesses...

More whitepapers...
ARTICLE Attackers Exploit Drupal Vulnerability

Automated attacks have potentially compromised the majority of websites that run the Drupal content...

Latest Tweets and Mentions

ARTICLE Attackers Exploit Drupal Vulnerability

Automated attacks have potentially compromised the majority of websites that run the Drupal content...

The ISMG Network