UK Must Comply With EU Privacy Law, Watchdog Argues

But Brexit May Upend Data Protection and Notification RulesIn the wake of a majority of British voters opting to leave the European Union, the U.K. Information Commissioner's Office argues that the country... Read more »

Chargeback Relief: Does It Go Far Enough?

Visa, MasterCard, AmEx Take Steps to Limit Fraud LiabilityReacting to strong complaints from retailers, three major card brands have finally taken steps toward reducing the amount of counterfeit fraud chargebacks to U.S.... Read more »

Data Science vs. Security: Where’s the Synergy?

Is it Time to Focus on Data Science to Secure Against Fraud?Security leaders say data science is becoming the building block of contemporary security solutions, showing great promise for developing necessary cyber... Read more »

Update: Ransomware, Digital Currency, Virtual Reality

In this edition of the ISMG Security Report, you'll hear our editors explore how hackers use Java script for ransomware, the latest digital currency security issue and privacy threats posed by virtual... Read more »

No-Brainer Ransomware Defenses

With ransomware attacks surging, all organizations should ensure they have an enterprise backup and disaster recovery plan in place, and eliminate all unnecessary, outdated or disused applications and services running on endpoints... Read more »

Roundup: Fraud Crackdown, Gov’t Sensitive Info at Risk

In this edition of the ISMG Security Report, you'll hear reports on the U.S. government nabbing healthcare fraudsters; federal agencies at risk of exposing highly sensitive data; and the hacking of brokerage... Read more »

Stresser/Booter Services Fuel DDoS Extortion

Cybercrime Services Plus Social Engineering Equals Payday, Akamai WarnsDespite police disrupting alleged DDoS extortion gangs such as DD4BC, inexpensive stresser/booter services have enabled copycats to continue these attacks, says Akamai's Martin McKe... Read more »

Let’s Encrypt Clashes with Comodo Over Trademark

Comodo Accuses Let's Encrypt of Copying Business ModelLet's Encrypt is crying foul over trademark applications made by Comodo that use the nonprofit project's name. Comodo is refusing to back down, which has... Read more »

CrowdStrike: Defenders Must Look Beyond Malware Detection

Executive Says Beware of Attack Techniques That Leave No TraceIn an in-depth interview, Michael Sentonas of breach response specialist CrowdStrike discusses how a focus on malware detection may still be leaving organizations... Read more »

Brexit: What’s Next for Privacy, Policing, Surveillance?

As Britain Exits EU, the Legal Changes Will Be ImmenseBy a margin of 52 percent to 48 percent, British voters have decided to leave the European Union. But as Britain renegotiates its... Read more »