Three Romanian men accused of running a cybercrime ring that used custom-built "Bayrob" malware and money mules to steal at least $4 million from victims have been extradited to face charges in the United States.
A third suspect alleged to be responsible for the 2014 JPMorgan Chase data breach, which affected more than 83 million customers, was arrested Dec. 14 after reportedly voluntarily returning to the U.S. from Russia.
The emergence of contactless chip payments on mobile phones is changing the way transactions are authenticated and secured, Jeremy King of the PCI Security Standards Council explains in this audio interview.
Ransomware attacks, which initially targeted Windows computers and then spread to Android mobile devices, are now targeting Linux servers as well, says Bob Lynch of Bitdefender, who describes a risk mitigation strategy in this video interview.
Hack attack victims often ask two questions: "Who did it? And can we hack them back?" But after an attack, with time of the essence for blocking further damage, those are the wrong questions for breached organizations to be asking, data breach response expert Alan Brill says in this audio interview.
How much time and effort will consumers put into protecting themselves from identity theft and financial fraud? That was the question posed by Aite Group's Julie Conroy in researching the new Global Security Engagement Scorecard. And the answer might just surprise you.
Leading the latest edition of the ISMG Security Report: an analysis of the impact on healthcare information security and privacy of the 21st Century Cares Act, which President Obama signed into law Dec. 13. Also, a report on the spread of malvertising and an update on the Bangladesh Bank cyber heist.
Following the government's recent demonetisation initiative, the RBI has announced removal of its two-factor authentication requirement for low-value card-not-present transactions. But some critics fear the move, designed as a catalyst for cashless transactions, could lead to an increase in fraud.
Hackers are increasingly taking advantage of new technologies, including analytics and artificial intelligence, to launch more sophisticated attacks and commit cybercrimes, Bill Fox, a former federal prosecutor, explains in this interview.
An internal investigation into the February theft of $81 million from the central bank of Bangladesh reportedly found that a handful of negligent and careless bank officials inadvertently helped facilitate the heist by outside hackers.
A report on the former head of the NSA and CIA questioning President-elect Donald Trump's understanding of cybersecurity leads the latest edition of the ISMG Security Report. Also, House Homeland Security Committee Chairman Michael McCaul outlines his vision of Congress' cybersecurity agenda for 2017.
In an in-depth audio interview, Troy Leach of the PCI Security Standards Council describes just-released guidance that's designed to help organizations simplify network segmentation, a practice the council strongly recommends to help protect payment card data.
Following the government's recent demonetisation drive, the use of "cashless" transactions is rapidly expanding in India. CERT-In has issued guidance on how to mitigate the new security risks involved. But will it prove helpful?
MSN and Yahoo are among the major websites hit by a wave of malicious advertisements that try to deliver malware to computers. It's a resurgence of activity by a group called AdGholas, which was active in July.