The Latest News

  • FFIEC: New Threats to Banks?

    Experts Weigh Reasons for New Regulatory Warnings FFIEC: New Threats to Banks?
    Shirley Inscoe of Aite

    While several experts say two new cyberthreat alerts from the FFIEC are primarily designed to make sure that smaller institutions are mitigating ongoing threats, Shirley Inscoe of Aite says they could also be an indicator of new threats on the horizon. Read more...

  • China Delays Tough Bank Tech Rules

    Banking Suppliers Would Have to Share Source Code China Delays Tough Bank Tech Rules
    U.S. Treasury Secretary Jacob Lew met with Chinese leaders March 30.

    Chinese officials have reportedly agreed to delay some banking-sector requirements aimed at foreign technology vendors, who were instructed to submit to rigorous audits and to add government-approved backdoors to their products. Read more...

  • PCI Issues Penetration Test Guidance

    Experts Debate Whether Advice Goes Far Enough PCI Issues Penetration Test Guidance

    Experts debate the value of new PCI guidance for how businesses should use penetration testing to identify network vulnerabilities that could be exploited for malicious activity. Does the new advice go far enough? Read more...

  • Fighting U.S. Card Data Fraud Overseas

    Feds Advocate Law Changes to Ease Prosecution of Fraudsters Fighting U.S. Card Data Fraud Overseas

    To help take down global "carding" rings, the U.S. Justice Department wants to expand current law so it can prosecute those who commit fraud anywhere in the world that involves U.S. payment card data. Read more...

  • Why POS Malware Still Works

    Security Experts: It's Too Easy To Infect Retail Systems Why POS Malware Still Works

    New, advanced point-of-sale malware dubbed "Poseidon" can exfiltrate card data directly from every infected device. And security experts warn that too many retailers fail to test POS devices and segment networks to mitigate all malware threats. Read more...

  • Article

    Will Executive Order Impact Cybercrime?

    Obama Calls for Sanctioning Suspected Attackers By Mathew J. Schwartz
    Will Executive Order Impact Cybercrime?

    Some legal and security experts are questioning the potential effectiveness of President Obama's new executive order that allows the U.S. government to block or seize the assets of individuals suspected of launching significant cyber-attacks

  • Article

    Feds Arrest 'Silk Road' Investigators

    Former Federal Agents Face Fraud, Money Laundering Charges By Mathew J. Schwartz
    Feds Arrest 'Silk Road' Investigators

    The U.S. Department of Justice has charged two former federal agents with money laundering and wire fraud based on allegations that they attempted to profit from the investigation into the underground narcotics marketplace known as "Silk Road."

  • Article

    GitHub DDoS Attack Traces to China

    Disruption Appears to Target Anti-Censorship Tools By Mathew J. Schwartz
    GitHub DDoS Attack Traces to China

    DDoS attackers have been targeting the popular code-sharing website GitHub. Security experts say the massive attacks appear to have originated from China and been designed to disrupt access to GitHub-hosted anti-censorship tools.

  • Article

    Tech Start-Up Slack Technologies Hacked

    Company Rolls Out Two-Factor Authentication Post-Attack By Marianne Kolbasuk McGee
    Tech Start-Up Slack Technologies Hacked

    Slack Technologies, a tech start-up that offers a group chat tool, announces it's rolling out two-factor authentication after hackers breached a database of user profile information.

  • Article

    Cybersecurity Bills: New Developments

    Info-Sharing Bill Advances; Breach Notice Measure Unveiled By Mathew J. Schwartz
    Cybersecurity Bills: New Developments

    The House Intelligence Committee has approved cyberthreat information sharing legislation that its leaders developed. Meanwhile, a national data breach notification bill has been introduced that's modeled on language proposed by the White House.

More news...

Webinars

More webinars...

White Papers

More whitepapers...
ARTICLE Did Regulator Cause a Data Breach?

A flash drive holding sensitive customer data was lost after a routine audit with federal...

Latest Tweets and Mentions

ARTICLE Did Regulator Cause a Data Breach?

A flash drive holding sensitive customer data was lost after a routine audit with federal...

The ISMG Network