Analog skimming devices that rely on audio technology are not new. They've been around since the early 1990s. But this less-expensive technology is making a comeback, some say, because of the downturn in the global economy.
Pradeep Moudgal says the U.S. is migrating toward EMV. But how much new investment are card issuers going to have to make, and what steps does the collective industry need to take to ensure the transition from the mag-stripe to the chip is a smooth one?
Unfortunately, says Ken Vander Wal, most organizations have done little to address security in their policies and procedures regarding BYOD, which is changing the ways companies address user behavior and risk.
Servers at Virginia Commonwealth University were recently hacked, potentially exposing Social Security numbers for more than 176,000 faculty, staff, students and affiliates at the university and the VCU Health System.
Winning senior executive support for information security spending requires "a solid business case of justifications," says Christopher Paidhrin, security compliance officer at PeaceHealth Southwest Medical Center.
The bust of six Estonians for one of the biggest online frauds ever is reminiscent of another type of organized crime: drugs. Despite the similarities, there's one big difference between drugs and online crimes.
Mobile banking is a 'must-have' today, but the foray into this new financial-services arena comes with risk. Consistent review and implementation of security layers and controls is the only strategic way to tackle emerging mobile offers.
U.S. and Estonian authorities have broken up one of the largest Internet crime schemes that allegedly netted $14 million in fraudulent advertising fees and infected 4 million computers in 100 countries.
Bank of America's Keith Gordon says securing the mobile channel is much like securing any other banking channel: Controlling risks requires layers of security and controls. But educating customers plays a key security function, too.