Savvy Hackers Don’t Need Malware

Report: Here's How Attackers Borrow Administrative Tools to Force EntryWhile malware may be used for an initial attack, hackers quickly begin using tools to move around networks that often don't raise suspicion.... Read more »

Fraud & Breach Prevention Panel: Where Do We Go From Here?

Read more »

The Fine Art of Selecting Service Providers in Today’s Breach Ecosystem

Read more »

The Evolution of EMV: The Rollout and Deployment Challenges

Read more »

In a Faceless Environment; We Need a New, Multidimensional Approach to Authentication

Read more »

‘Dark Overlord’ Deals Data, and Congress Tackles Crypto

The Dark Overlord selling stolen healthcare databases for bitcoins leads the ISMG Security Report. Also hear about banks' move toward real-time transaction fraud controls and a bipartisan attempt in Congress to tackle... Read more »

PCI-DSS: Building Global Acceptance

Achieving international acceptance of PCI-DSS is an ongoing challenge, says Jeremy King, international director of the PCI Security Standards Council, who's working to educate merchants about baseline security that goes far beyond... Read more »

House Committee Seeks Crypto Calm

But Legislative Group Hug Won't Change Encryption FactsWould access to better information pertaining to encryption help Congress pass good crypto-related laws? That's the impetus behind a "Digital Security Commission" and a related... Read more »

Biometrics for Children: Don’t Share

'Child ID Kits' Carry Identity Theft Risks, Experts WarnWarning to parents and guardians: Beware of collecting, storing or sharing your child's biometric information - including fingerprints and DNA - even if you're... Read more »

Here’s How a Hacker Extorts a Clinic

The Unsettling Tale of How 'The Dark Lord' Shakes Down TargetsAn individual claiming to be the hacker who posted four healthcare databases on the dark web reveals some of his tactics. We... Read more »