As a result of Experian's data breach, 15 million T-Mobile subscribers are at risk from phishing attacks and fraud. But it's not clear what more T-Mobile can do to protect breach victims, says security specialist Mark James.
A Russian cybercriminal who used the Citadel banking Trojan to infect at least 7,000 PCs has received a 4.5 year jail sentence. Authorities tracked him in part thanks to his posts to a Citadel user group.
PCI Council General Manager Stephen Orfei says the migration to EMV in the United States will facilitate faster adoption of contactless mobile payments. That's why mobile will be a hot topic at the PCI Council's annual North America Community Meeting this week.
The leader of a $24 million identity theft and tax refund fraud ring, which stole data from a military hospital, the Alabama Department of Public Health and others, has been sentenced to serve 15 years in prison. Experts recommend steps organizations can take to prevent such crimes.
Europe's successful migration to EMV, which began more than a decade ago, employed deadline shifts, education for cardholders and merchants and an approach based on PIN codes. Here are lessons for the in-progress U.S. migration to EMV.
For contact centers, the value and viability of security questions may be ending. Professional fraudsters can successfully answer questions using stolen customer records from growing cyberbreaches; Customers in the online age are unhappy spending the extra 45 seconds. Security questions frustrate customers more than...
Security experts warn about a trio of new threats: GreenDispenser cash-out malware, the Shifu banking Trojan being spread via malvertising attacks and Neutrino crimeware getting an upgrade to steal payment-card data.
The fraud shift as a result of the migration to EMV chip payments in the U.S. will extend beyond card-not-present payments, experts at Information Security Media Group's fraud and data breach summits in San Francisco last week warned.
The use of Bitcoin poses big cybersecurity and money-laundering concerns for banks. But the transaction infrastructure used by cryptocurrencies offers many features that banks should put to use, says former FBI Special Agent Vince D'Agostino.
Too often, individuals who fail to take the proper steps to secure IT aren't punished for their reckless behavior. But should those who consistently fail to follow safe cyber hygiene be severely penalized for repeatedly falling for phishing attacks?
For contact centers, the effectiveness of security questions is declining. Professional fraudsters can successfully answer questions using stolen customer records from growing cyberbreaches. Adding more security questions is not an option - customer experience is impacted by any extra delay. Is there a way for more...
Year after year, cyber threats continue to increase in both sophistication and
frequency. Many of the attacks involve compromised user names and passwords.
In an environment where identity theft, data breaches
and fraud are increasing, as anywhere, anytime access for
employees, partners and customers is also...
A second Russian has pleaded guilty in connection with the largest U.S. hacking scheme, which compromised more than 160 million payment card numbers. But three other alleged conspirators have yet to be arrested.
Spear phishing is the preferred attack method for advanced threat actors. Well-crafted spear phishing attacks easily slip past layers of defenses and target the only vulnerability that cannot be patched -- people. The vast majority of headline data breaches in recent years have all begun with spear phishing attacks....
A Russian hacker who was extradited to the United States earlier this year has admitted his role in the largest hack attack in U.S. history, which resulted in the theft of 160 million payment card numbers. Find out how much time he could spend in prison under his plea agreement.