- German researchers hack Galaxy S5 fingerprint login
- Today's Approach to Security is Broken
- JP Morgan to invest £150 million on boosting cyber security
- Financial services firms to increase cyber security budgets this year, PwC claims
- Google introduces Chrome 'factory reset' pop-ups to tackle extensions hijacks
Industry efforts to shore up payment card security after the massive data breach at Target appear to be devolving into a battle over chip vs. PIN technology between retailers and credit card companies.
A senior executive from Visa Inc. dismissed concerns over the manner in which the Europay MasterCard Visa (EMV) chip card standard is being implemented in the U.S. and insisted the move will yield significant security benefits for retailers, consumers and banks.
A group representing 22 of the world's largest banks is pushing for broad adoption in the U.S. of payment card technology called tokenization, citing shortcomings in the planned migration to the Europay MasterCard Visa smartcard standard over the next two years.
Nasdaq's unprecedented trading halt today stemmed from a technical glitch with a core data feed that disseminates market data for Nasdaq-listed securities.
Cyber exercises, like the Quantum Dawn 2 drill carried out by dozens of Wall Street firms this week, can be useful in helping financial firms close critical gaps in their incident response capabilities, analysts said.
More DDoS attacks on banks, cyberwarfare, and targeted attacks could well be in store in 2013, security experts warn.
Sign up now »
Balancing the requirement for strong network security with the need to harness collaborative web technologies is essential for business growth.
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.