MasterCard is testing a smartphone app that lets users approve online transactions using facial recognition, via the equivalent of taking a selfie. But could such technology be spoofed, and will it reduce card fraud?
The St. Louis Cardinals baseball team has fired its scouting director amidst allegations that the team hacked into a database run by its rival Houston Astros team. A related investigation is ongoing.
An unconfirmed post-breach report for bitcoin exchange Bitstamp shows the organization was targeted by a sustained attack that combined phishing via email and Skype with macro malware to successfully steal almost 19,000 bitcoins, worth $5 million.
Cisco announced plans to pay $635 million to purchase cloud security firm OpenDNS to better secure the "Internet of Everything." OpenDNS says the acquisition will leave its products and personnel intact.
The PCI Security Standards Council has just released version 2 of its point-to-point encryption standard. Jeremy King of the PCI SSC explains how this optional standard can complement PCI-DSS compliance.
Would encryption, two-factor authentication and other measures stop a determined adversary from stealing millions of U.S. government personnel files? No, a former CIA CISO says. Read how Robert Bigman would defend against OPM-style cyber-attacks.
Adoption of the financial services top-level domain ".bank" will provide enhanced email authentication capabilities, three experts explain in part two of a panel discussion on the new TLD.
Big data analytics may be new to some healthcare organizations, but there are plenty of lessons to be learned from successful deployments. Rick Gamache of Red Sky Alliance shares some of these key lessons.
What is the state of healthcare's migration to cloud services, and what are the risks of being left behind? William Hudson of VMware shares insights on hybrid solutions and cloud strategies.
European authorities say they have disrupted a Ukraine-based cybercrime gang tied to $2.2 million in fraud in Europe, the United States and beyond, perpetrated via banking Trojans, botnets and hacking-for-hire services.
Law enforcement officials in Europe plan to disrupt the use of social media to broadcast "terrorist and extremist propaganda," but security experts questioned whether such moves will blunt the recruitment of new ISIS fighters and so-called "jihadist brides."
The U.S. Office of Personnel Management breach continues to reveal such staggering levels of information security problems, paper-pushing and seeming incompetence that it's creating a new cyber-espionage category: the "victim-as-a-service" provider.
Enterprise developers are under pressure to produce quickly mobile apps, often leaving security as a second thought. Denim Group's John Dickson suggests ways to make security a priority.
Chris Feeney, recently named president of BITS, the technology and policy division of the Financial Services Roundtable, describes his top cybersecurity priorities, including helping members deal with insider threats.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.