Following the government's recent demonetisation initiative, the RBI has announced removal of its two-factor authentication requirement for low-value card-not-present transactions. But some critics fear the move, designed as a catalyst for cashless transactions, could lead to an increase in fraud.
Hackers are increasingly taking advantage of new technologies, including analytics and artificial intelligence, to launch more sophisticated attacks and commit cybercrimes, Bill Fox, a former federal prosecutor, explains in this interview.
Hours after President Obama directed intelligence agencies to conduct a full review of alleged efforts by the Russians to influence the 2016 presidential election, reports surfaced that the CIA in a secret report concluded with "high confidence" that the Kremlin tried to influence the vote in favor of Donald Trump.
Over the past two years, DDoS attacks have grown in strength and in purpose - they are often used now as a tool of extortion, says Richard Meeus of security vendor NSFOCUS. How should security leaders prepare to respond to these strikes?
An internal investigation into the February theft of $81 million from the central bank of Bangladesh reportedly found that a handful of negligent and careless bank officials inadvertently helped facilitate the heist by outside hackers.
A report on the former head of the NSA and CIA questioning President-elect Donald Trump's understanding of cybersecurity leads the latest edition of the ISMG Security Report. Also, House Homeland Security Committee Chairman Michael McCaul outlines his vision of Congress' cybersecurity agenda for 2017.
In an in-depth audio interview, Troy Leach of the PCI Security Standards Council describes just-released guidance that's designed to help organizations simplify network segmentation, a practice the council strongly recommends to help protect payment card data.
MSN and Yahoo are among the major websites hit by a wave of malicious advertisements that try to deliver malware to computers. It's a resurgence of activity by a group called AdGholas, which was active in July.
According to one report, barely one-third of global organizations feel prepared to handle a modern cyberattack such as malvertising or ransomware. Justin Dolly of Malwarebytes explains how security leaders can step up their game in 2017.
Coming soon to an internet service provider near you: routers infected by IoT device botnet-building malware such as Mirai. The latest victim is ISP TalkTalk, which is updating routers to block DDoS attackers who have been seizing control of the devices.
Facebook, Microsoft, Twitter and YouTube have promised to contribute to a shared database containing hashes - digital fingerprints - of images and videos that promote hatred or terror to facilitate more rapid takedowns. But does the project go far enough?
The threat landscape certainly has changed in recent years. But can you say the same about the traditional intrusion prevention system? Kurt Bertone of Fidelis Cybersecurity lays out what to look for in a next-gen IPS.
A just-issued report from President Obama's Commission on Enhancing National Cybersecurity outlines challenges the next administration should address. Observations from one of the panel's commissioners highlight the latest episode of the ISMG Security Report.
As fraudsters continually refine their techniques to steal banking customers' credentials, IBM fights back with new tools that use behavioral biometrics and cognitive fraud detection. IBM's Brooke Satti Charles offers a preview.