Extradited Russian national Vladimir Drinkman, who's been charged with masterminding the largest-ever hack attack in U.S. history, this week pleaded not guilty in U.S. federal court to 11 charges relating to the theft of 160 million payment cards.
When an FTC administrative trial on the data security practices of medical testing firm LabMD resumes March 3, an FTC judge could consider questions raised by a Congressional panel regarding Tiversa, a security firm at the center of the case.
Target is the high-profile example, but many organizations have been breached through third-party vulnerabilities. Where are the security gaps, and how can they be filled? BitSight's Stephen Boyer offers insight.
A team of hackers has been operating since at least 2001, wielding malware that even today is among the most advanced attack code to have ever been discovered, according to a new study. Security experts are debating whether the NSA could be involved.
Efforts to mitigate cybersecurity and privacy risks involving automobiles continue to gain traction. A new report articulates the challenges, and federal legislation to address key issues is pending.
As cybercrime grows, Section 66A of India's IT Act is under scrutiny of the court, government and security leaders. Some experts say it requires amendments to ensure correct interpretation and implementation.
A key component of President Obama's executive order to encourage industry to share cyberthreat data is the creation of information sharing and analysis organizations, or ISAOs. But now, the hard part begins: defining the job and getting it done.
Despite commitments by leading payment card brands to enhance security, some critics say the White House cybersecurity summit produced no specifics for how the public and private sectors will curb cyber-fraud.
The Anunak/Carbanak gang continues to rob financial services firms and retailers, in part with ATM malware. A new report says the cybercrime gang has stolen up to $1 billion from banks in Russia, the U.S. and beyond.
The White House Summit on Cybersecurity and Consumer Protection late last week served as the stage for more than a dozen companies and trade groups to announce new initiatives aimed at securing Internet transactions and payments and reducing fraud.
In a Feb. 13 keynote speech at a cybersecurity summit, President Obama described the cyberworld as the "wild, wild West" and the American government as the sheriff. Then he signed an executive order aimed at boosting cyberthreat information sharing.
On the heels of the FFIEC's new business continuity guidelines, Deputy Comptroller Beth Dugan hints that new guidance related to cybersecurity risks affecting payments and mobile transactions may be coming.
Congressional investigators for the first time are designating protecting the privacy of personally identifiable information as a high risk area within the federal government and calling on Congress to enact new legislation to enhance PII safeguards.
At a White House summit at Stanford University today, President Obama will sign an executive order to encourage more private sector information sharing. But will businesses buy into his proposals?
Enterprise IT administrators are being urged to immediately patch a flaw that affects every Windows system released for the past 15 years. Attackers could remotely exploit the flaw to take control of a device and run any code of their choice.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.