European authorities say they have disrupted a Ukraine-based cybercrime gang tied to $2.2 million in fraud in Europe, the United States and beyond, perpetrated via banking Trojans, botnets and hacking-for-hire services.
A growing number of ATM card reader eavesdropping attacks involve attackers getting in through a tried-and-true method - taking advantage of commonly used electronic access keys or codes. What can be done to stop these attacks?
A "deliberate" denial-of-service attack against state-owned LOT Polish Airlines resulted in ground crews being unable to generate flight plans. The airline now says its systems were not hacked, but rather disrupted, and that all airlines face similar risks.
India has yet to experience a data breach on the scale of Sony or Home Depot. But the market is growing, and so are breach risks, says Kroll's Reshmi Khurana. How must security leaders prepare their organizations?
Office of Personnel Management Director Katherine Archuleta tells Congress that neither she nor anyone else at OPM should be held personally responsible for a breach of agency computers in which the personal information of millions was stolen.
The Ministry of Home Affairs has instructed the Intelligence Bureau to create a cybersecurity architecture and a specialised wing to augment infrastructure. This must be immediate, practical and real, experts say.
The hack of the U.S. Office of Personnel Management may have exposed personal information for "tens of millions" of people, a new report says, with a single database containing information for 18 million people.
Those advocating the use of the ".bank" top-level domain argue that it offers better security than ".com." In part one of a two-part interview, Craig Schwartz of fTLD Registry Services and Doug Johnson of the ABA explain the security provisions.
Law enforcement officials in Europe plan to disrupt the use of social media to broadcast "terrorist and extremist propaganda," but security experts questioned whether such moves will blunt the recruitment of new ISIS fighters and so-called "jihadist brides."
Polish airline LOT claims that a hack attack disrupted its ground-control computers, leaving the airline unable to issue flight plans and forcing it to cancel or delay flights, grounding 1,400 passengers.
When it comes to malware, how wide is the gap between infection and detection - and what is the potential business impact on organizations? Paul Martini, CEO of iboss Cybersecurity offers insights and strategies.
The Big Data explosion will expand in volume, velocity and variety. Analytics are key to deriving insights from this data, particularly in cybersecurity and anti-fraud, says Dominic Ligot of Teradata Philippines.
Security researchers warn of "Xara" flaws in Apple iOS and OS X that could be used to intercept passwords and banking data, as well as a keyboard app that puts more than 600 million Samsung device users at risk.