Adoption of the financial services top-level domain ".bank" will provide enhanced email authentication capabilities, three experts explain in part two of a panel discussion on the new TLD. Read more »
Former IPS Officer, Industry Veteran Tapped to Lead BodyThe Data Security Council of India has confirmed the appointment of Nandkumar Saravade as its new Chief Executive Officer. What is Saravade's immediate agenda,... Read more »
But Intel Chief Urges Policymakers to Improve DefensesChina is the "leading suspect" behind the OPM breach, says Director of National Intelligence James Clapper, who adds that until the U.S. can meaningfully deter... Read more »
Obama Presses Chinese Government to Lower Cyber TensionsChina and the U.S. have agreed to create a new cyber "code of conduct." The move comes in the wake of the U.S. Office of... Read more »
'Deliberate Attack' Disrupted Issuing Flight PlansA "deliberate" denial-of-service attack against state-owned LOT Polish Airlines resulted in ground crews being unable to generate flight plans. The airline now says its systems were not... Read more »
Also, Swedish Blackshades Malware Mastermind SentencedA Turkish man who allegedly masterminded a string of quick-hit ATM "cash out" attacks - netting at least $55 million - has reportedly been extradited from Germany... Read more »
Employing context-aware security can reduce the risk of a hacker mimicking a legitimate user to illicitly access a system, says Bill Evans of Dell Security. Read more »
Those advocating the use of the ".bank" top-level domain argue that it offers better security than ".com." In part one of a two-part interview, Craig Schwartz of fTLD Registry Services and Doug... Read more »
The Big Data explosion will expand in volume, velocity and variety. Analytics are key to deriving insights from this data, particularly in cybersecurity and anti-fraud, says Dominic Ligot of Teradata Philippines. Read more »
ATM 'Eavesdropping' Alert Highlights New RisksA growing number of ATM card reader eavesdropping attacks involve attackers getting in through a tried-and-true method - taking advantage of commonly used electronic access keys or... Read more »