Save Mart, the Modesto, Calif.-based grocery chain, now confirms that skimming devices are to blame for the data breach believed to have exposed hundreds of consumer accounts to debit and credit card fraud.
Bank of America's Keith Gordon says securing the mobile channel is much like securing any other banking channel: Controlling risks requires layers of security and controls. But educating customers plays a key security function, too.
Unfortunately, user accounts with reduced privileges do not provide protection from attack, misuse or compromise. Reduced privileges for end-users can only be regarded as one part of an effective security strategy that should not be solely relied on. Organizations should know the limitations of this approach to...
"With a company-issued device, you can issue a policy that says users have no rights of privacy over information on the device," says Javelin's Tom Wills. But with employee-owned devices? A whole new set of issues.
Executives in a variety of industries who are in charge of securing their enterprises' IT say they're more anxious about outsiders hacking into their systems than insiders - either maliciously or inadvertently - threatening their digital assets, a new survey shows.
"Systems compromised by this botnet provide the attackers not only user credentials and confidential information, but remote access inside the compromised networks," says Amit Yoran, CEO of NetWitness, which revealed the Kneber attacks.
Alex Cox, Research Consultant and Principal Analyst, NetWitness
Alex Cox, a research consultant and principal analyst at the IT security firm NetWitness, discovered last month the Kneber botnet, a variant of the ZueS Trojan that he says has infested 75,000 systems in 2,500 corporate and governmental organizations...
Marcus Ranum has a unique take on the biggest information security threats to organizations and individuals.
A renowned expert in secure systems and design, Ranum, currently the CSO of Tenable Security, offers a new look at topics such as the risks of cloud computing and what he calls the myth of cyber warfare.