The Paul Allen card breach reiterates a concern financial fraud experts have been screaming about for years: Socially-engineered schemes that compromise employees. So, what can institutions do about them?
While Microsoft's move to take down Zeus malware-related botnets is touted as a unique approach to fight financial fraud, some industry experts question its long-term viability. What are their concerns?
The Defense Department will employ a two-prong approach - securing the perimeter as well as the data - as it develops its cloud-computing architecture. "We're going to be able to better protect as we get more standardized," CIO Teresa Takai says.
Hacking is behind most large-scale data breaches. What steps can organizations and leaders take to safeguard their information post-attack? Karen Barney of the Identity Theft Resource Center offers advice.
Cybersecurity Act sponsors intensify their campaign to enact the legislation that would change the way the government protects critical federal and private-sector IT networks as a group of key Republican senators offers an alternative bill.
Detectives have arrested seven suspects and seek 13 more in an ATM skimming investigation involving hundreds of credit and debit cards compromised in parts of Canada, the U.S., Australia and Indonesia.