More than 1,000 U.S. businesses have likely been infected by Backoff, a new point-of-sale malware linked to numerous remote-access attacks, according to an Aug. 22 advisory from the Department of Homeland Security.
Financial institutions feel the pain of recent retail breaches, and they seek new ways to secure payments and fight fraud. But how can security leaders influence changes within their own organizations?
2014 has seen an explosion of mobile banking demand and services. But as the channel grows, so do the threats against it. What are today's top threats, and how can institutions offer more secure mobile banking?
As more organizations accommodate employees' demands to use mobile devices, ensuring the security of the applications on those smart phones and tablets has become critical. That's why NIST is developing new apps testing guidance.
As UPS Stores reveals that 51 of its locations were infected with POS malware, a restaurant in New Orleans confirms its POS system was breached using Backoff - malware about which federal authorities recently issued a warning. Experts offer analysis.
Michael Daniel explains that among his biggest challenges as special assistant to the president is fully understanding the economics and psychology behind cybersecurity, topics that few people have mastered.
Apple's forthcoming iOS 8 includes a number of useful new security and privacy features, says Symantec threat researcher Candid Wueest. But there are missing features he'd still like to see implemented.
The FTC has granted final approval of its settlements with Fandango and Credit Karma on charges that the companies failed to secure the transmission of millions of consumers' sensitive personal information from their mobile apps.
The widespread use of mobile devices and social media has fueled spear phishing by eroding the so-called perimeter that once shielded corporate networks, a panel of financial fraud experts says in part two of their discussion about spear phishing trends.
Customers increasingly use digital channels to interact with organizations. But these interactions raise new security concerns that must be addressed by IAM solutions, says David Gormley of CA Technologies.