Did you ever count the number of vendors your organization uses to run your business operations? Even mid-sized companies easily exceed one hundred third-party vendors, including technology vendors, electricity, hosting, facilities, payment,... Read more »
In the wake of the Target, Neiman Marcus and other retail breaches, banking/security leaders clearly feel abused and frustrated - and they want to see changes in how merchants conduct and process... Read more »
Today, many vendors are developing sandboxes to help stem the rising tide of advanced threats. Many vendors claim they can a broad range of advanced attacks. But do they?
Not all sandboxes... Read more »
What would happen if hackers got hold of your database of credentials, but discovered that it didn't contain any passwords that were hashed or encrypted? Password hashfiles are the weak... Read more »
The Reserve Bank of India on Sept. 22, 2011 issued a notification on security issues and risk mitigation measures related to card-present transactions. Read more »
The Reserve Bank of India has updated its mobile banking circular, dated Dec. 24, 2009, removing the 50,000 Rupees per customer, per day limit. Read more »
The Institute for Development and Research in Banking Technology has launched the Mobile Banking Security Lab to explore solutions to the evolving challenges in the area of mobile banking and security. Read more »
The Institute for Development and Research in Banking Technology has prepared an information security framework to help banks in benchmarking their systems and enhancing information security. Read more »
Malware Attack Against Processor Affected 330 StoresGoodwill Industries International has confirmed that a breach of a card processor's systems, which involved malware, affected customers' payment data at more than 330 of its... Read more »
Defenses Don't Block Backup-Retrieval Attacks, Experts ContendSome security experts say a thriving celebrity-photo-theft subculture has long been hacking iCloud, employing techniques that bypass strong passwords and Apple's two-factor authentication sy... Read more »