Networking giant Fortinet warns that more products than it initially suspected have a hardcoded password that attackers could abuse to remotely gain backdoor access to vulnerable devices. But why did the flaws take so long to be found?
Security experts are warning that Chinese networking product manufacturer TP-Link has been shipping routers with a WiFi password that's based on their MAC address, thus making their passwords easy for would-be attackers to sniff.
As recent history dictates, the migration to EMV chip-enabled cards has resulted in a massive surge in card-not-present (CNP) fraud. Converging pressures, including the U.S. EMV migration, rapidly growing e-commerce transaction volumes, and data breaches, is likely to lead to a painfully sharp rise in CNP fraud. ...
BankInfoSecurity announces its fourth annual list of top influencers, recognizing leaders who are playing significant roles in shaping the way banking institutions and financial services companies approach information security.
Despite the frequency of healthcare data breaches, only half of U.S. hospitals have the infrastructure to support two-factor authentication, according to a new report. Plus, some information security leaders say implementation of the technology at many of those facilities is likely relatively narrow.
Has authentication become too complex for
banking institutions? That's a legitimate concern, says Peter Tapling of Early Warning.
The key, he says, is to leverage new strategies and solutions to unify and simplify
Download this eBook to explore new authentication strategies and:
Dell's announcement that it plans to purchase storage maker EMC for a mind-boggling $67 billion does not make clear the fate of EMC's information security unit, RSA. Analysts believe Dell has not yet determined whether RSA fits into its long-term plans or should be sold or spun off.
Defeating biometrics-based security with far-fetched schemes, such as stealing or replacing eyeballs and fingertips, is a recurring theme in the movies. But real-world advances in authentication will help make it difficult to circumvent real-world security.
For contact centers, the value and viability of security questions may be ending. Professional fraudsters can successfully answer questions using stolen customer records from growing cyberbreaches; Customers in the online age are unhappy spending the extra 45 seconds. Security questions frustrate customers more than...
The severity of the U.S. Office of Personnel Management breach continues to grow, with investigators now reporting that hackers stolen 5.6 million people's fingerprint data. The theft may have security implications well into the future.
For years, information security experts have been warning users to create complex, unique passwords, and organizations to secure them properly. But an analysis of 12 million cracked Ashley Madison passwords shows how much we're still failing.
Year after year, cyber threats continue to increase in both sophistication and
frequency. Many of the attacks involve compromised user names and passwords.
In an environment where identity theft, data breaches
and fraud are increasing, as anywhere, anytime access for
employees, partners and customers is also...
The U.S. payments infrastructure will come up far short of completing the rollout of EMV technology by the Oct. 1 fraud liability shift date. Experts say high costs, a perceived lack of consumer demand and doubts about EMV's ability to significantly reduce card fraud are to blame.