Has there been an undisclosed data breach? In the wake of the latest revelations by Global Payments Inc., some fraud analysts wonder whether they might be seeing signs of a separate breach.
Gartner Analyst Avivah Litan, one of the first fraud experts to report the Global Payments Inc. data breach, says the latest revelations raise more questions than answers about the incident's impact.
The compromise of bank cards at two banks in New Zealand has garnered attention to the growing ATM fraud trend. What are the banks and law enforcement doing to address the losses?
In its second formal statement about its data breach, payments processor Global Payments Inc. says this incident is confined to North America and involves fewer than 1.5 million payment cards.
In the wake of the Global Payments Inc. card breach, ID theft expert Neal O'Farrell says banks and credit unions must be proactive with outreach to customers. What should institutions' messages include?
"If they can do it against RSA, that makes most of the other companies vulnerable," says Army Gen. Keith Alexander, the military's Cyber Command commander and National Security Agency director.
Technology is only part of the solution. To truly combat phishing, banking institutions need to address a trickier part of the equation. They need to change human behavior. Here are experts' tips.
The Global Payments Inc. breach could be one of the four largest card-related incidents in recent years. Here's a look at three other major payment card breaches.
From 2010: When he first learned of the full magnitude of the Heartland Payment Systems data breach, Heartland CEO Bob Carr had one overriding thought: "Can we survive this?"
Many organizations are still using personal information, such as mother's maiden name and date of birth, to verify user identities. However, personal data is everywhere - in search engines and on social networking and other third-party sites - making the use of these static data elements a less secure measure for...
Today's threat landscape is challenging enough. But what happens when organized crime adopts the techniques developed by hacktivists? Learn more about the top 10 threats to security by 2014.
Information Security Media Group announces the launch of two new weekly newsletter tracks representing its DataBreachToday and InfoRiskToday media sites. Click for details on how to subscribe.
The FTC proposes that privacy protections be built at every stage in developing online products and consumers be given the option to decide what information is shared about them and with whom through a do-not-track system.
Increasingly, social engineers target unwitting insiders to plunder organizations' financial and intellectual assets. How can you prevent these and traditional inside attacks? CMU's Dawn Cappelli offers tips.
The ECRI Institute recently published a report on controlling the risks involved in using social media in healthcare. Read on to discover insights on how to address risks and prevent breaches.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.