Chase says hackers compromised servers for the bank's UCard Center website for prepaid card accountholders, potentially exposing card numbers. The bank is not reissuing cards, but it's offering free credit monitoring.
Akamai's acquisition of DDoS mitigation provider Prolexic Technologies is a sign of how the DDoS-defense marketplace is maturing at a time when attacks are becoming more sophisticated.
A new takeover scam that the FBI calls a "man-in-the-e-mail" attack has drained $1.65 million from three Seattle-area businesses' accounts. Learn what steps to take to avoid becoming the next victim.
As U.S. banking institutions make the EMV migration, fraud will migrate from payments cards to areas such as check and first-party fraud, says Fiserv's Mike Urban. How must institutions prepare?
Can the two most feared nations in cyberspace finally come to an agreement to stop hacking each other and stealing confidential data? Here's one peace-making approach worthy of consideration.
You can be outraged that the NSA collects Internet communications records of U.S. citizens. But don't be surprised, says sociologist William Staples. This is just one example of our "culture of surveillance."
ATM skimming attacks, and subsequent fraud losses, are increasing, even in European markets where EMV chip cards are the standard. Learn why some experts predict a continued surge in skimming in the months to come.
To improve cyberthreat and cybercrime information sharing, law enforcement officials and business leaders need to develop better working relationships, says federal prosecutor Erez Liebermann.
Governments and others using cloud-based services should keep 10 security tips in mind, including making sure they can maintain control of their data if a service provider goes bankrupt, says Dimitra Liveri, co-author of a new report.
In the wake of a surge of lawsuits, bipartisan Congressional support is building for a measure designed to help protect banking institutions from frivolous patent infringement claims, says NAFCU's Brad Thaler.
The emergence of attackers-for-hire is a troubling trend in cybercrime, and one particular group is changing its techniques to gain access to computer systems, says Symantec researcher Kevin Haley.
NIST will soon start writing the "final" version of its cybersecurity framework, a guide to information security best practices for operators of the nation's critical infrastructure. But should it be beta tested?
Twitter's announcement that it's adding "forward secrecy" encryption to its sites should serve as a reminder that organizations need to continually assess the risks to their organization, experts say.
The White House is intensifying its effort to get federal agencies to adopt continuous monitoring and move away from the paper-based checklist compliance they've followed for a decade under the Federal Information Security Management Act.
Attempts to shame China haven't been effective in stopping that country from pilfering intellectual property from the computers of American companies, according to a new report to Congress from a special commission.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.