The Office of Personnel Management's decision to stop using U.S. Investigations Services for certain security clearance services, which came a month after a breach of company computers, could be as much a reflection on OPM as it is on USIS.
Security experts see good news and bad in Apple's latest announcements. Upsides include Apple Pay and numerous privacy and security improvements in iOS 8. But after the celebrity photo leak, iCloud fixes remain missing.
Google says just 2 percent of the recent dump of nearly 5 million credentials to Russian cybercrime forums contained valid Gmail username and password combinations. But anyone who reused the same passwords on other sites remains at risk from hackers.
At a hearing held the day before the 13th anniversary of the Sept. 11 terrorist attacks, representatives of the FBI and the Department of Homeland Security joined two senators in stressing the need to ramp up efforts to repel emerging cyberthreats.
The PCI Security Standards Council has released an update to its guidance for merchants on protecting against card skimming attacks in POS environments that spells out best practices for addressing the latest attack scenarios.
Security experts are advising Google users to change their passwords in the wake of almost 5 million usernames and passwords surfacing on Russian cybercrime forums. But some of the stolen data may be several years old.
Now that Home Depot has confirmed its payments breach, industry experts weigh the possibility that the home-improvement giant's attack is linked to earlier breaches at Target, Sally Beauty and P.F. Chang's.
Congress isn't ignoring cybersecurity as lawmakers return to Washington this week. But it's unlikely the House or Senate will vote on any significant cybersecurity legislation before they adjourn later this month in advance of the election.
What steps can organizations take to mitigate insider fraud threats? Michael Theis of Carnegie Mellon, a featured speaker at ISMG's upcoming Fraud Summits in Toronto and London, explains why using data analytics is key.
The EU is expected to approve in October an updated data protection law that spells out uniform breach notification requirements, security expert Jacky Wagner explains. The measure would apply to any business that targets Europeans.
Apple's advice to always use strong passwords and two-factor authentication ignores that image hackers are bypassing those controls - and celebrities aren't the only victims. Here's what needs to change.
Call center data and logs can help banks predict account-takeover attempts across multiple banking channels, says fraud expert Matt Anthony, a presenter at ISMG's upcoming Fraud Summits in Toronto and London.
A decision as to when a cyber-attack would lead to the invocation of Article 5 - the provision that states an attack on one member state is deemed an attack on all members - will be made on a case-by-case basis.