In the wake of a majority of British voters opting to leave the European Union, the U.K. Information Commissioner's Office argues that the country should still comply with the EU's data privacy rules. But will politics get in the way?
A new report from researchers at RSA describes how cybercriminals are using social media, including Facebook, to not only network about their attacks, but also sell card data and other compromised consumer information. Daniel Cohen of RSA FraudAction describes the report in this video interview.
To minimize the risk of business email compromise schemes and similar types of fraud, senior executives at businesses should avoid posting information about their activities on social media and other accessible forums, says security expert Chuck Easttom.
Hyatt warns that it's the latest hotel chain to fall victim to POS malware. It's offered scant breach-related details, but lots of bromides about taking payment card security seriously and urging customers to keep paying by card.
Twitter has issued its first-ever alerts to some users that they may have been "targeted by state-sponsored actors." Some cryptographers, software developers and security experts say they have received the alerts.
RSA Conference Asia Pacific and Japan, which wrapped up last week, was a successful reflection of this region's hottest security topics. Here are some of my own observations, as well as feedback from the attendees.
The Ashley Madison dating website hack and threatened data release is a perfect illustration of the perils - and promise - of our Internet-connected, hacktivist age, whether it comes to online dating or the Internet of Things.
Law enforcement officials in Europe plan to disrupt the use of social media to broadcast "terrorist and extremist propaganda," but security experts questioned whether such moves will blunt the recruitment of new ISIS fighters and so-called "jihadist brides."
NASSCOM and DSCI have launched a cybersecurity task force to help develop India as a global R&D hub. Experts question whether the sponsoring organizations have set the right agenda for this new entity.
The Supreme Court has quashed Section 118 (d) of the Kerala Police Act for violating the fundamental right of freedom. Some cyberlaw experts call it a short-sighted decision that will deter the fight against cybercrime.
In a landmark judgment, the Supreme Court of India struck down the controversial Section 66A of India's Information Technology Act, saying it violated the right to free speech as guaranteed by India's constitution.
As cybercrime grows, Section 66A of India's IT Act is under scrutiny of the court, government and security leaders. Some experts say it requires amendments to ensure correct interpretation and implementation.
Experts agree that Section 66A of India's IT Act is not meant to violate anyone's right to free speech or lead to frivolous complaints based on annoyance. What's not clear is what kind of messages would be considered offensive, resulting in punishment.
ICICI Bank has launched a new payments service to enable customers transfer funds via twitter. Can it ensure a secure transaction and reach its goal of enabling Gen Y to leverage the service effectively?