Numerous websites, mail servers and other services - including virtual private networks as well as "all modern browsers" - have a 20-year-old flaw that could be exploited by an attacker, computer scientists warn.
Unlike previous presidential campaigns, cybersecurity will be raised by candidates on the hustings, although the issue likely won't play a big role in determining the election. Two GOP candidates - Marco Rubio and Rand Paul - already have broached the topic.
Federal authorities have arrested a Chinese professor, accusing him of pilfering trade secrets from the computer systems of American high-tech companies where he and a co-conspirator once worked.
Visa has agreed to increase the reimbursement paid to banking institutions that must reissue cards in the wake of a merchant breach. Now the smaller card issuers, such as community banks, are getting paid the most.
Did information security expert Chris Roberts exploit vulnerabilities in airplanes' onboard entertainment systems, allowing him to access a plane's thrust management computer and cause it to climb?
An army of 40,000 small office/home office routers have been exploited by automated malware. But who's responsible for devices being vulnerable: vendors for using well-known defaults; or distributors and IT managers for not locking them down?
The Reserve Bank of India plans to set up an IT subsidiary to help banks strengthen cybersecurity. Banking and security leaders say this is a positive move toward responding to cybercrime trends.
The use of century-old laws and the lack of a data protection regime is hurting India's ability to combat cyberfraud, says independent adviser Nandkumar Saravade. What immediate steps must be taken?
Caffeine junkies are up in arms over reports that criminals have been targeting their Starbucks account balances. But the real story is poor password-picking practices by consumers, and Starbucks' lack of multi-factor authentication.
After recently announcing an investigation, Sally Beauty Supply now confirms that it has "sufficient evidence to confirm that an illegal intrusion into our payment system has indeed occurred." The retailer reported a similar breach in March 2014.
To battle nation-state cyberthreats, the U.S. must work with its allies to develop norms of behavior in cyberspace that could then be adopted by other nations, experts said at a Senate hearing.
Patching is among the primary challenges facing enterprises in their adoption of IoT devices. Fortinet's Darren Turnbull shares insight on how to anticipate and respond to the top security obstacles.
Wanted: Hackers for hire. Or in British government parlance: "Committed and responsible individuals who have the potential to carry out computer network operations to keep the U.K. safe." Ready to apply?
The FBI is offering a big-stakes reward for an alleged criminal who ranks at the top of its "cyber most wanted" list. But one cybercrime expert asks: "Would you cross the Russian mafia or some organized crime gang for $3 million?"
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.