Thefts of iPhones in New York, San Francisco and London declined after Apple added a remote-disabling feature. Now Google and Microsoft have promised to offer the feature in their mobile operating systems.
Joining the FBI and New York City police as a member of the newly formed financial cybercrimes task force is the Metropolitan Transportation Authority. A regional transit company battling financial cybercrime? Makes sense when you look at its network.
Two months after the OpenSSL flaw known as Heartbleed was discovered, remediation efforts have slowed. But several security experts laud businesses' rapid response to the threat, noting that they've installed related fixes more quickly than usual.
If the NSA's meddling in NIST cryptography standards soiled the reputation of the National Institute of Standards and Technology, an amendment approved by the House of Representatives could help restore it.
Banking institutions must improve how they analyze cyber-threat intelligence. But without better tools, security leaders can't adequately anticipate new attacks, says Greg Garcia, the new executive director of the FSSCC.
Infrastructure security used to be more manageable. But it's far more complex in today's cloud environment. Carson Sweet of CloudPassage shares insight and strategies to improve cloud infrastructure security.
A privacy activist's case against Facebook for allegedly sharing Europeans' personal data with the NSA in violation of EU data protection rules has been referred to the European Court of Justice for review.
To help prevent data breaches involving business associates, healthcare organizations need to develop vendor management programs with razor-sharp requirements, says risk management expert Rocco Grillo.
The U.K. government's legal justification for spying en masse on British residents' online communications - Google searches, Facebook posts, Webmail - is questioned by privacy and Internet law experts as part of a case triggered by Edward Snowden's leaks.
Identity fraud is one of consumers' most feared crimes, and at banks those schemes translate into application fraud. FICO's Adam Davies discusses today's common application fraud scams and how to stop them.
Kentucky is now the 47th state to enact a breach notification law. While a national law superseding the widely varying state statutes is long overdue, the primary election defeat of House Majority Leader Eric Cantor makes passing such a bill tougher.
It's well known that lost or stolen unencrypted computing devices account for the majority of large health data breaches. But a new report from the Department of Health and Human Services shines a light on how frequently breaches - especially smaller ones - involve paper records.
The U.S. federal government's top telecommunications regulator is proposing a "new regulatory paradigm" by calling on communications providers to step up and assume new responsibilities to manage cyber-risks.