Attributing cybercrime to specific criminals is becoming increasingly critical, says Eward Driehuis of threat intelligence firm Fox-IT. Using the elusive Dridex campaign as an example, Driehuis explains in this video interview how many malware attacks are interconnected.
Apple has removed hundreds of apps from its App Store for violating its user-tracking guidelines. Chinese mobile advertising firm Youmi has issued "sincere apologies" for the tracking behavior and promised to compensate affected developers.
ATM fraud losses are increasing globally, and we can expect to see this trend continue as the U.S. ramps up its migration to EMV at the point of sale. Unattended terminals are easy to compromise, and they will always be among fraudsters' favorite targets.
Unprecedented levels of collaboration among targeted financial services firms enabled the international law enforcement operation that disrupted the Dridex botnet, security firm Fox-IT says. Now, can that model be repeated going forward?
By identifying abnormal data access behavior, machine learning systems could improve breach prevention and fraud detection in the healthcare arena and other sectors, contends artificial intelligence expert Robert Leithiser.
FBI Director James Comey's declaration that the Obama administration will not pursue legislation to require vendors to create a backdoor that would permit law enforcement to circumvent encryption on mobile devices isn't the end of the matter.
An international law enforcement operation - spearheaded by the U.S. FBI and U.K. National Crime Agency - has disrupted the notorious Dridex banking malware and phishing campaign, which has been tied to at least $40 million in losses worldwide.
Dell's announcement that it plans to purchase storage maker EMC for a mind-boggling $67 billion does not make clear the fate of EMC's information security unit, RSA. Analysts believe Dell has not yet determined whether RSA fits into its long-term plans or should be sold or spun off.
Security researchers have demonstrated in a lab setting an information-stealing attack against Amazon Web Services users. But Amazon says its customers "using current software and following security best practices are not impacted by this situation."
Healthcare organizations should take three important steps to help improve the cybersecurity of medical devices used in their environments, says security expert Kevin Fu. Hear his advice in this interview.
Convenience store operators say they aren't going to be fully EMV compliant anytime soon - and it's not their fault. Learn what else they had to say about their security challenges at this week's NACS Show 2015 in Las Vegas.
An alert issued - and then yanked - by the FBI about fraud vulnerabilities linked to EMV chip cards is reigniting the debate between bankers and retailers over whether EMV in the U.S. should be chip-and-PIN or chip-and-signature.