Report: Here's How Attackers Borrow Administrative Tools to Force EntryWhile malware may be used for an initial attack, hackers quickly begin using tools to move around networks that often don't raise suspicion.... Read more »
The Dark Overlord selling stolen healthcare databases for bitcoins leads the ISMG Security Report. Also hear about banks' move toward real-time transaction fraud controls and a bipartisan attempt in Congress to tackle... Read more »
Achieving international acceptance of PCI-DSS is an ongoing challenge, says Jeremy King, international director of the PCI Security Standards Council, who's working to educate merchants about baseline security that goes far beyond... Read more »
But Legislative Group Hug Won't Change Encryption FactsWould access to better information pertaining to encryption help Congress pass good crypto-related laws? That's the impetus behind a "Digital Security Commission" and a related... Read more »
'Child ID Kits' Carry Identity Theft Risks, Experts WarnWarning to parents and guardians: Beware of collecting, storing or sharing your child's biometric information - including fingerprints and DNA - even if you're... Read more »
The Unsettling Tale of How 'The Dark Lord' Shakes Down TargetsAn individual claiming to be the hacker who posted four healthcare databases on the dark web reveals some of his tactics. We... Read more »