Fresh Fraud Reports Follow 2014 BreachOne year after Sally Beauty Supply revealed that a network breach compromised payment card data and exposed 25,000 records, the company says it is investigating new breach... Read more »
Oman CERT's Salehi on Building an Incident Response StructureOman is dealing with the challenge of increasing cyber incidents and a rise in cybercrime and so on. How does Oman's CERT address this... Read more »
Malaysia's cybersecurity chief believes awareness is vital to establish security readiness to stay ahead of threats. Dr. Wahab's agenda includes developing security centers of excellence to fight threats. Read more »
Malware researchers can track important technical details about attacks, but shutting down cybercrime networks requires law enforcement agencies to take the next step, says Alexander Erofeev of Kaspersky Lab. Read more »
To deliver effective information sharing and threat intelligence, the security industry must settle on a single set of threat-sharing standards, says David Duncan of the Internet security firm Webroot. Read more »
Class-Action Suit Was Filed Over Compromised Cards, AccountsAdobe Systems plans to settle a class-action lawsuit filed after its 2013 breach. By settling, Adobe avoids potentially damaging public discussions about its security practices,... Read more »
Rogue applications designed to impersonate a company's corporate brand are increasingly prevalent, offering attackers an easy way to fool online users into downloading malicious apps aimed at compromising credentials, says Arian Evans... Read more »
As the U.S. completes its payments migration to the EMV chip, merchants and card issuers should be bracing for an uptick in card-not-present fraud, says Carol Alexander, head of payment security at... Read more »
To secure the growing number of devices being used within enterprises requires organizations to be sure they're providing the right access to the right resources for the right people, says Ping Identity's... Read more »
As organizations move toward storing and processing more data on the public cloud, security needs be automated and based on sound policies to mitigate growing threats, says HyTrust President Eric Chiu. Read more »