Two Ukrainians and an American have been indicted for their alleged involvement in an international cybercrime scheme that used stolen information from banks, businesses and government agencies in an attempt to steal at least $15 million.
A review of the RSA 2014 agenda shows several seminars, panels and speakers of particular interest to healthcare-focused attendees, including those focused on mobile device security and medical device hacks.
The use of synthetic identities is a rising concern for organizations, and financial institutions are often the ones taking the hit for the fraud, says Claudel Chery of the U.S. Postal Inspection Service.
Using "synthetic identities" to commit fraud is becoming easier, but it's increasingly difficult for organizations to detect this type of deception, says Claudel Chery of the U.S. Postal Inspection Service.
Hackers allegedly trafficking in personally identifiable data have reportedly breached the computers of three major data aggregators, raising doubts about knowledge-based authentication as a tool to verify identity.
Termination of an employee after a breach should be reserved for repeat offenders, individuals who show a total disregard for the rules, those who seek to harm another or the most egregious incidents, security expert Mac McMillan contends.
The apparatchiks at the Kremlin think they're clever sorts with plans to replace computers with typewriters to prevent the American e-spies at the National Security Agency from hacking into Russian intelligence systems.