Financial services firm E*Trade and publisher Dow Jones are separately warning their customers and subscribers that their personal information - and in some cases, payment card data - may have been compromised in a cyberattack campaign.
Convenience store operators say they aren't going to be fully EMV compliant anytime soon - and it's not their fault. Learn what else they had to say about their security challenges at this week's NACS Show 2015 in Las Vegas.
An alert issued - and then yanked - by the FBI about fraud vulnerabilities linked to EMV chip cards is reigniting the debate between bankers and retailers over whether EMV in the U.S. should be chip-and-PIN or chip-and-signature.
From the advent of the ATM to the introduction of EMV, banking institutions have seen a steady evolution of financial services - and fraud. Howard Trotman of BAE Systems Applied Intelligence discusses the fraud evolution.
How will China's arrest of hackers who pilfered American trade secrets affect U.S.-China cybersecurity relations? Experts offer an analysis of the implications.
Three U.S. senators are demanding answers from Experian after it suffered a breach that exposed personal information for 15 million T-Mobile subscribers. They also have called for national breach notification and data security regulations.
NACS attorney Doug Kantor says small businesses are getting a raw deal from the card brands when it comes to expectations for EMV migration. The expense is too high, and the fraud-reduction benefits too low to make EMV worthwhile, he argues.
Has authentication become too complex for banking institutions? That's a legitimate concern, says Peter Tapling of Early Warning. He offers strategies to simplify and unify authentication strategies.
Less than a year after the United States Postal Service revealed that hackers breached agency computers, many employees continue to click on phishing messages that contain false links, according to an inspector general report.
Security leaders do well securing stored data and data in transit. But what about the integrity of data after it reaches the intended recipient? This is a huge gap to be bridged, says Chris Kniffin of Seclore.
With organizations increasingly moving to the cloud, more security professionals are needed to help secure those environments as well as manage incident response. Cloud forensics expert Neha Thethi outlines must-have skills, qualifications and certifications.
The shift to the EMV standard in the U.S. has drawn incredible media attention for more than a year as everyone witnesses the approach of the looming liability shift deadline. But what does it really mean for merchants, consumers, and hackers? I say the answer is actually very little, and in as few words as possible,...
One week after the EMV fraud liability shift took effect for U.S. merchants, experts say much more needs to be done to prepare merchants for chargebacks and new socially engineered scams aimed at exploiting consumers.
A cybercrime ring that employed the Angler Exploit Kit to earn an estimated $34 million per year - from ransomware infections alone - has been disrupted by security researchers at Cisco's Talos security intelligence and research group.
Security on the endpoint took a long time to move away from mere patching, hardening and anti-virus technologies. To fight advanced threats, experts say visibility on endpoints is being transformed by the advent of endpoint detection and response tools.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.