By using federated digital credentials, the federal government has taken a significant step toward creating more efficiency to better serve the needs of the American people in the 21st century, Cybersecurity Coordinator Howard Schmidt says.
Criminals manipulate an ATM so that the cash requested is blocked or trapped. Once the user gives up and leaves the ATM, the fraudsters come in and remove the cash. So, how can banks prevent this scam?
Mike Brown and Amry Junaideen see audits as great tools to promote heftier IT security budgets, substantiating where dollars should be spent to safeguard an organization's information systems and assets.
Facial recognition, arguably, is the technology that most threatens individual privacy online, and that's on the mind of Senate Commerce Committee Chairman Jay Rockefeller, who has asked the FTC to report on its growing use.
While the debate over privacy swirls, the actual voice of the consumer is rarely heard. Until now. And what the consumers have to say in new research about privacy notices and data usage may surprise you.
A Pasco County, Fla., man has been charged for his involvement in a summer skimming spree that targeted Bank of America ATMs. Why do authorities believe he likely has connections to an international crime ring?
Giving employees the chance to use their own mobile devices on their employers' network isn't necessarily given. That's what Delaware Chief Security Officer Elayne Starkey found when the state implemented a new program to allow the secure use of personal devices on state networks.
When Mano Paul of (ISC)2 discusses today's top application security challenges, he draws an analogy with sharks. And what he views as the skills needed to tackle today's top threats might surprise you.
The Durbin Amendment to the Dodd-Frank Act brought enormous change to the payments industry. But within this change comes a whole new value proposition for the PIN debit network - and for institutions' efforts to fight fraud.