The hacker community can be a cynical crowd, or perhaps a realistic one, that tries to make the best of the threats confronting society. CISO Dan Geer, for example, prefers to hire security folks who are, more than anything else, sadder but wiser.
A report that a Russian hacker group dubbed "CyberVor" is hoarding more than 1 billion stolen passwords triggered worldwide concern, but security experts caution that scant details have been revealed, making the threat tough to judge.
Peruse the agenda for the Black Hat security conference that's being held this week in Las Vegas and you'll get a peek at some of the major cybersecurity challenges ahead - and potential solutions.
It's unlikely that the downing of a Malaysian airliner by an anti-aircraft missile over Ukraine and the air and land battles in Gaza could expand into a cyberwar. Here's why.
When the U.S. transitions to chip-secured payment cards, banking institutions will see a significant uptick in card-not-present fraud. What can they be doing now to prepare? Fiserv's Patrick Davie shares tips.
Using big data to fight fraud is a challenge for most organizations. Andreas Baumhof of ThreatMetrix explains how context-based authentication combines fraud and security to leverage the use of big data.
A bank's $350,000 settlement with a California oil company should serve as a reminder that reasonable security measures offered by banks are increasingly critical to the outcome of account takeover disputes.
A new study shows the accuracy of facial recognition algorithms has markedly improved over the past three years, though one of the report's authors suggests they're not at the level to be a highly reliable form of authentication.
It's not quite the cyberwar many have envisioned, but the United States and China are tangled in a brawl that resembles, in some respects, a combination of a trade war and cyber-sniping.
Financial Institutions already apply out-of-band security in many instances. The challenge is: How do we help protect payment cards when they are used at any number of online and brick-and-mortar retailers?
The Federal Reserve will make recommendations this summer for how the United States could launch a "fast-payments" system with enhanced authentication, says Kirstin Wells of the Federal Reserve Bank of Chicago.
Individuals resort to lying about themselves to protect their identities when accessing systems in today's imperfect cyber world, says Peter Tapling, president of Authentify, an out-of-band authentication service.
Understanding the behavior patterns of individuals with access to an organization's most important credentials is one of the keys to privileged management, says CyberArk's Matt Middleton-Leal.
There's a ton of event content to choose from at Infosecurity Europe 2014, which runs from April 29 through May 1, and here are some of the sessions that caught one editor's eye.
President Obama has reportedly decided that the government shouldn't exploit encryption flaws, such as Heartbleed, in most instances unless there's "a clear national security or law enforcement need." But how should that need be determined?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.eu, you agree to our use of cookies.