Vermont's $30,000 settlement with a breached retailer proves states can play an important role in holding retailers more accountable for losses associated with card fraud, and issuers should take notice, one banker says.
Nations' policies for mitigating cyberthreats can conflict with efforts to promote cyber-enabled global trade, cautions Allan Friedman, research director of the Brookings Institution's Center for Technology Innovation.
Russian authorities have reportedly arrested a man believed to be the author of the Blackhole exploit kit, widely used by cybercriminals to exploit vulnerabilities in Web browsers and other software to infect user computers with malware.
To mark his induction into the National Cyber Security Hall of Fame, Purdue University Computer Science Professor Eugene Spafford offers insights on key challenges, including overcoming senior executives' misperceptions about key issues.
Face-to-face and over-the-phone social-engineering schemes are increasingly used to perpetrate fraud, highlighting the need for more education and real-time transaction monitoring, says Gartner's Avivah Litan.
Despite the recent lull in al-Qassam Cyber Fighters' DDoS attacks against U.S. banks, the ABA's Doug Johnson and FS-ISAC's Bill Nelson warn banks to avoid complacency, noting that DDoS attacks pose an ongoing threat.
The FFIEC has warned banking institutions to take steps now to avoid security and operational risks associated with Microsoft's plans to discontinue support of Windows XP. Experts explain why replacing the operating system is critical.
Knowledge-based authentication is no longer reliable, says fraud expert Avivah Litan, an analyst at Gartner. She explains why so-called behavioral authentication is the only reliable way to verify users.
The United States should be prepared for a dramatic increase in card-not-present fraud as cards using the EMV standard are widely deployed, says card fraud prevention expert Julie Conroy of Aite, who describes the reasons why.
Randy Trzeciak and his CERT Insider Threat Center colleagues are working to broaden the definition of the insider threat to incorporate not just the risk to information and IT but to facilities and people, too.