Shellshock Bug: How to Respond

To mitigate the newly discovered Bash bug - AKA Shellshock - which may make millions of systems vulnerable to remote takeover, organizations must take several key steps, says security expert Alan Woodward. Read more »

Financial Inclusion: Security Challenge

The Modi government's "Jan Dhan Yojana" is ambitious, and security concerns are vast. Awareness, complexity and scope must be addressed, says Pervez Goiporia, vice president, IDM development, at Oracle India. Read more »

Responding to the ‘Year of the Breach’

McAfee's Michael Sentonas and Sean Duca discuss emerging threat vectors, sharing how cybercrime impacts the landscape and how lessons from recent global breaches can be applied to the Indian context. Read more »

Banks: How to Stop POS Breaches

Helping Merchants with PCI Compliance, Malware MitigationIn the wake of recent POS breaches, like the one suspected at Home Depot, forensics experts say more banks are taking proactive steps to help merchant... Read more »

Goodwill: 868,000 Cards Compromised

Malware Used in Compromise of Third-Party VendorGoodwill Industries International says in an update about a breach affecting about 330 of its stores that approximately 868,000 payment cards were exposed. It also identifies... Read more »

Veritas Capital to Acquire BeyondTrust

Security Intelligence Firm Serves Multiple MarketsPrivate equity firm Veritas Capital will acquire BeyondTrust, a cybersecurity software company, from venture capital firm Insight Venture Partners. Financial details of the acquisition were not disclosed. Read more »

Privacy: A Path to the C-Suite

How a Little Privacy Can Take a Security Program FarYou need to combine IT security knowledge with business acumen if you want to find yourself among the ranks of chief information officers... Read more »

Is Apple iCloud Safe?

Defenses Don't Block Backup-Retrieval Attacks, Experts ContendSome security experts say a thriving celebrity-photo-theft subculture has long been hacking iCloud, employing techniques that bypass strong passwords and Apple's two-factor authentication sy... Read more »

Insights From Our Fraud Twitter Chat

Online Dialogue Dived Into Prevention, Detection IssuesA Twitter chat featuring Gartner's Avivah Litan offered a lively discussion of numerous fraud-related issues, including card breaches, weak authentication and the need for mobile scrutiny.... Read more »

Goodwill Confirms Card Data Breach

Malware Attack Against Processor Affected 330 StoresGoodwill Industries International has confirmed that a breach of a card processor's systems, which involved malware, affected customers' payment data at more than 330 of its... Read more »