Security experts trace many of the world's cybercrime attacks to Russia. But Russian authorities never extradite suspects, and they allow hackers to operate with impunity - if they play by some ground rules.
The urgency of shifting to EMV to reduce card fraud is one of many hot topics on the agenda at Information Security Media Group's Fraud Summit San Francisco, to be held Sept. 15. Keynoter Eduardo Perez of Visa will kick things off with an in-depth analysis of the migration to EMV.
Yet another health insurer - Excellus BlueCross BlueShield - has belatedly discovered that its systems were hacked. The breach potentially exposed information on 10.5 million individuals, was discovered in August, but appears to have begun in 2013.
Bad news about APT: Attacks are bigger, faster and aimed at a wider variety of targets. How must organizations win board support to improve their defenses? Lockheed Martin's Justin Lachesky shares insight.
It's "cyber party" time, as self-described "eccentric millionaire" - and onetime anti-virus company founder - John McAfee announces that he's entering the 2016 U.S. presidential race with a newly created party that will focus on security and privacy.
BlackBerry plans to buy mobile device management rival Good Technology for $425 million. BlackBerry must prep for a future in which it no longer manufactures hardware - and that's why this deal makes sense.
Mozilla, which maintains the Firefox browser, says an attacker infiltrated its bug-tracking tools, stole information on an unpatched flaw, and exploited users for at least three weeks, before the flaw was patched.
Sony Pictures Entertainment has reached a tentative deal to settle a class-action lawsuit filed against it, stemming from its 2014 data breach, which resulted in the leak of personal information for up to 50,000 employees.
Four years after the FFIEC issued its updated authentication guidance, many banking institutions say account takeover losses have gone up, a new survey shows. John LaCour of PhishLabs explains why institutions' reactive approach to fraud is failing.
The U.S. Office of Personnel Management promises that it will soon notify 21.5 million individuals that their background-check information was breached. Meanwhile, the government has lined up notification and response services for future needs.
Government agencies used to be the top attack target, as well as the top source of threat intelligence. How did the private sector turn the tables, and what can government do to improve? Rapid7's Wade Woolwine offers insight.
More hackers are exploiting remote-access and network vulnerabilities, rather than installing malware to invade networks and exfiltrate data, says Dell SecureWorks' researcher Phil Burdette. That's why conventional breach-detection tools aren't catching the intrusions.
Policymakers must consider three factors before imposing sanctions in retaliation for state-backed hacks: Confidence in its attribution of responsibility, the impact of the incident and the levers of national power at a state's disposal.