The Regin espionage and surveillance malware offers attackers advanced capabilities, but a new analysis of two recovered modules finds the components are basic and unveils potential clues to the identity of its creator.
As a result of President Obama's "Buy Secure" initiative, the federal government this month is kicking off its chip-and-PIN rollout. Fraud experts now debate what impact the move will have on banks' EMV chip-card strategies.
Adobe confirms that a zero-day flaw exists in its Flash browser plug-in and promises to soon release Windows, Mac and Linux fixes for affected versions of Flash Player. The vulnerability is reportedly already being targeted by in-the-wild attacks.
Is Amazon India on the verge of extending its online payments gateway to offline sellers and kiranas? And if so, what are the potential business implications and security risks for Indian organizations?
Banking experts disagree about whether the Supreme Court's decision to uphold the Fed's debit interchange fee structure will have an impact on financial institutions' EMV investments and long-term fraud prevention strategies.
In the aftermath of a payment card breach, as fraudsters race to exploit the stolen information, card issuers and affected customers take steps to mitigate risks. Here's a look at the lifecycle of a payment card breach from three perspectives.
The U.S. likely won't complete its implementation of EMV for many years to come, despite the October 2015 liability shift date for counterfeit card fraud, many forecasters say. And until it's fully deployed, EMV will have little impact on fraud.
Emerging malware increasingly puts banks and their customers at risk for fraud. The sooner malware is detected and removed, the less likely banks are to suffer regulatory penalties and fines, and steep losses linked to fraud.
The globalization of fraud waged by organized crime has spurred new cross-channel attacks and is affecting how ATM operators approach data security, executives from three of the world's leading ATM manufacturers explain in this exclusive interview.
North Korean leader Kim Jong-un was set to star in a satirical video game, in which he battled the forces of imperialist oppression with the help of unicorns and narwals - until hackers apparently disrupted game development.
The U.S. migration from magnetic-stripe payment cards to EMV-compliant cards is in full swing, thanks in part to massive breaches at retailers. This infographic offers a timeline of progress in implementing this new technology.
ATM vendors are working together to enhance threat information sharing and ensure hardware and software compatibility. In part two of an exclusive three-part interview, three leading ATM manufacturers explain why collaboration has become so important.
Bankers are criticizing one federal regulatory agency for how it has responded to a breach of unencrypted consumer data that occurred during a routine banking exam. They're saying regulators should focus more on their internal security practices.
Nobody wants to be a cyber-attacker's first victim. But there are benefits to being second or third, says Akamai's Mike Smith. Then you get to enjoy the true benefits of the oft-discussed information sharing.