Easy Access Fuels ATM Attacks

ATM 'Eavesdropping' Alert Highlights New RisksA growing number of ATM card reader eavesdropping attacks involve attackers getting in through a tried-and-true method - taking advantage of commonly used electronic access keys or... Read more »

Will Sony Settle Cyber-Attack Lawsuit?

Beleaguered Studio Still Beset by Legal Costs, PR DamageSony's 2014 cyber-attack cleanup costs continue to mount. The company reports spending $35 million on remediation as of March, and costs will continue to... Read more »

Apple, Samsung Devices: Bug Warnings

Over 600 Million Samsung Devices at Risk from Keyboard FlawSecurity researchers warn of "Xara" flaws in Apple iOS and OS X that could be used to intercept passwords and banking data, as... Read more »

Banks to Roll Out Real-Time Payments

Security Experts Highlight Fraud, Security RisksBank-owned digital payments network clearXchange is rolling out a real-time payments platform that will be available to 100 million online banking customers. Security experts weigh in on... Read more »

Wipro Develops Fraud Detection Model

Aims at Improved Risk Management by Using Big DataWipro has developed a fraud detection model for improved risk management using big data analytics. Can CISOs leverage it to reduce risk, enhance process... Read more »

New BITS President on Cyber Threats

Chris Feeney, recently named president of BITS, the technology and policy division of the Financial Services Roundtable, describes his top cybersecurity priorities, including helping members deal with insider threats. Read more »

Securing Homegrown Mobile Apps

Enterprise developers are under pressure to produce quickly mobile apps, often leaving security as a second thought. Denim Group's John Dickson suggests ways to make security a priority. Read more »

Disrupting Attacks With Kill Chains

Threat intelligence is increasingly being brought to bear to help businesses apply kill-chain concepts, focusing on disrupting discrete parts of online attacks as early as possible, says Fortinet's Simon Bryden. Read more »

How Secure is Mobile App Development?

India's burgeoning mobile penetration has led to a massive uptake in app usage. Frenetic development to meet demand has found security ignored. Dhananjay Rokde discusses how this ecosystem functions today. Read more »

Post-Malware Outbreak: Rip and Replace?

Zombie Attack Lessons Learned from Germany's BundestagForget attributions of the German parliament malware outbreak to Russia, or Chancellor Angela Merkel's office being "ground zero." The real takeaway is the Bundestag's apparent lack... Read more »