FBI Director James Comey says he wants Congress to update a 20-year-old law to give law enforcement authorities access to the encrypted data of suspected criminals.
Apps for wearable devices that are designed to track a user's pulse rate, blood-oxygen level or location may be leaking that data during transmission, Symantec security researcher Candid Wüeest warns in a Black Hat Europe briefing.
Amsterdam is again playing host to the annual Black Hat Europe information security gathering, and presenters have promised to cover everything from privacy flaws in wearable computers to two-factor authentication system failures.
An important lesson to learn from the massive JPMorgan Chase breach is that banks can't just focus on protecting card data and online banking accounts; they also must protect their customers' personally identifiable information.
The development of authentication technologies that could replace the password is "nearing a tipping point," but there's still several years of work to do, says Jeremy Grant, who oversees the National Strategy for Trusted Identities in Cyberspace.
Apple announces security and privacy changes tied to the release of iOS8, including better data encryption, more secure iCloud backups, and a corporate promise to be more transparent. But it delays release of its HealthKit.
Federal government auditors have identified weaknesses in the technical controls protecting the security of the federally run Obamacare HealthCare.gov website and systems, which they say create increased and unnecessary risks.
Apple's advice to always use strong passwords and two-factor authentication ignores that image hackers are bypassing those controls - and celebrities aren't the only victims. Here's what needs to change.
This week's PCI Community Meeting in Orlando will tackle key issues in the wake of point-of-sale malware attacks and subsequent card breaches, offering a fresh look at card security.
The FBI and Apple are investigating the release of hundreds of celebrities' nude photographs and videos, which security researchers suspect is tied to compromises of iCloud, Dropbox or other cloud service accounts.
You need to combine IT security knowledge with business acumen if you want to find yourself among the ranks of chief information officers and other high-level positions. Here's how privacy can help.
A Twitter chat featuring Gartner's Avivah Litan offered a lively discussion of numerous fraud-related issues, including card breaches, weak authentication and the need for mobile scrutiny. We'll host more chats soon.
Initial reports suggested that Russian hackers could behind an attack against JPMorgan Chase, and perhaps other U.S. banks. While it's still far from clear who the culprits are, experts discuss the potential hacking motivations of a nation-state.
Digital privacy isn't a privilege or a policy. It's a fundamental human right, says Rajesh Vellakkat, partner in the law firm of Fox Mandal & Associates. What are today's top legal challenges to privacy?
A Google-like search engine known as ICReach has enabled government agencies to share more than 850 billion records from phone calls, e-mails and Internet chat sessions, according to a report that cites leaked documents from Edward Snowden.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.