Speculation surrounding the cause of the disappearance of Malaysia Airlines Flight 370 hasn't included the possibility of a cyber-attack. But one cybersecurity expert contends hacking an airliner is feasible.
Cosmetics supplies retailer Sally Beauty Supply now acknowledges that fewer than 25,000 records containing payment card data were illegally accessed and possibly removed as a result of a network intrusion.
Yi-Kai Liu, a computer scientist at NIST, explains how he's attempting to use quantum physics to devise a way to create a one-shot memory device that could help secure, for example, transactions or administrative passwords.
Two Stanford University researchers are conducting a study using crowdsourcing to show that the NSA's culling of telephone metadata can reveal a lot about an individual. I joined the crowd to find out what the metadata says about me.
In a preliminary step toward enactment of a new EU data protection law, the European Parliament on March 12 approved a draft proposal for a comprehensive overhaul of the EU's 1995 data protection directive.
Disclosing that it fulfilled only 11 percent of the requests for customer information from U.S. law enforcement agencies during the second half of 2013, Microsoft reiterates its call for an international framework that protects customers' rights.
Although adoption of mobile banking is accelerating, mobile payments have yet to reach a tipping point and security issues need to be addressed, says Marc Warshawsky of Bank of America, a mobile banking pioneer.