Two fraud suspects had the perfect scheme, skimming payment card numbers at local gas pumps and then using counterfeit cards to buy more than $70,000 worth of goods at area merchants. But then they got greedy.
IT security practitioners should understand why the bits, bytes and network connections - the technologies - are important to their organization's goals. Ignorance of the mission, for IT security folks, isn't bliss.
Police say financial specialist Librado Wright spent months siphoning more than $500,000 from Wachovia Bank's customer accounts. But when he attempted to withdraw the funds, the bank had a surprise for him.
A new intelligence community report to Congress shows how the proliferation of new technologies, such as portable devices that connect to the Internet, will create new espionage opportunities for malicious actors.
The draft publication defines high-priority requirements for standards, official guidance and technology developments that need to be met in order for agencies to accelerate their migration of existing IT systems to the cloud computing model.
On Tuesday, Bank of America caved in to competitive and public pressure, reversing its decision to impose a fee for consumer debit transactions. So, now where will institutions find new revenue to help fight fraud?
Online risks, card skimming and data leakage are the top threats to Asia Pacific and Indian banks, and financial institutions are just starting to implement security measures and regulations to combat the growing threat landscape, says Gartner's Matthew Cheung.
Heavily regulated industries like banking and healthcare have been reluctant to make the virtualized leap to the cloud, fearing a loss of control could open them to unforeseen risk. Are their concerns unfounded?