Ex-FBI Agent on DNC Breach Investigation

The FBI is investigating the compromise of the DNC and related party organizations. The big question is whether the FBI will be able to definitively attribute the various hacks to Russia. Former... Read more »

MICROS Breach: What Happened?

Potential Russian Cybercrime Gang Link Could Spell Big TroubleThe apparent breach of a system support portal used by Oracle MICROS to remotely access and service MICROS point-of-sale systems has raised more questions... Read more »

Tailoring Your Approach to Consumers in Different Countries

Appealing to the cultural and economic specifics of a foreign market is the key to getting consumers to shop more frequently and spend more. Read more »

Own a Piece of Bitcoin History

US Marshals Auction Bitcoins Seized in High-Profile CasesDo you have $100,000 burning a hole in your pocket and an abiding love of bitcoins? If so, then the U.S. Marshals Service has an... Read more »

Alleged EMV Flaw Stirs Debate

Lingering Mag-Stripe Opens Doors for New Types of AttacksDid security researchers at financial solutions provider NCR unveil a security flaw with EMV - one that could allow hackers to steal card data... Read more »

Comey Renews the Debate Over Encryption Bypass

A report on FBI Director James Comey seeking to reopen the debate over creating for law enforcement a bypass to encryption on mobile devices is among the stories featured in the latest... Read more »

London Police Busted For Windows XP Possession

Pity the Poor Plod Stuck with Microsoft's Finest, Circa 2001London's Metropolitan Police Service is under fire for continuing to use 27,000 PCs that run the outdated Windows XP operating system, as well... Read more »

Inside Look at SWIFT-Related Bank Attacks

Colin McKinty of security firm BAE Systems - hired by SWIFT in the wake of the $81 million heist from the Bank of Bangladesh - explains why BAE now believes the malware... Read more »

Espionage Malware Penetrates Air-Gapped Networks

Active Cyber-Espionage Campaign Dates From 2011, Security Firms WarnA very advanced and targeted cyber-espionage campaign has been active for five years, and employs stealthy malware that can penetrate air-gapped networks and exfiltrate... Read more »

Power Shifts to the People in Job Hunt

The recent U.S. employment report shows that, increasingly, jobs are plentiful while workers are scarce. Read more »