Taiwan Heist Highlights ATM Weaknesses

Key Vulnerability: Many ATMs Still Run Versions of Windows XPThe theft of $2.2 million from dozens of ATMs in Taiwan, executed using malicious software, defies a years-long effort by banks and software... Read more »

Ransomware Variant Deletes Everything

'Ranscam' Malware Pretends Bitcoin Ransom Will Recover Nuked FilesHow low will ransomware go? New malware - dubbed Ranscam - demands bitcoins to unlock files, but in reality they've already been deleted, researchers... Read more »

SWIFT to Banks: Who You Gonna Call?

Hackbusters Team Will Battle Bank Hackers, SWIFT PromisesInterbank messaging service SWIFT will begin collecting and sharing anonymized attack information and offering incident-response services - backed by Fox-IT and BAE Systems - to... Read more »

Researchers Unleash Ransomware Annihilation

New Tool Spots File Changes Then Halts RansomwareRansomware is devastating, and current security software doesn't do a great job of stopping it. But researchers say ransomware's behavior - quickly encrypting large volumes... Read more »

Breach Response: Investigations, Prosecutions and What to Do

Read more »

Business Email Compromise and Account Takeover – An Easy Backdoor to Corporate America’s Funds

Read more »

EMV Rolled Out and Liability Shifted: Restaurant Fraud Emerged from the Shadows

Read more »

The Vulnerability of Systems: The Importance of Infrastructure and Changing the Conversation

Read more »

How to Be a Wartime CISO

Parag Deodhar, the new CISO for Asia Pacific and Japan at Paris-based AXA Group, discusses key strategies for "wartime" CISOs in this in-depth interview. Read more »

Obama Sees Need to Improve Federal Government IT Security

In the wake of the controversy over Hillary Clinton's use of private email servers, President Obama voices his concerns about the state of federal government IT security in this edition of the... Read more »