The Latest News

  • UK Telco Confirms Data Breach

    TalkTalk Says Fraudsters Are Using Stolen Data UK Telco Confirms Data Breach

    The U.K. telco TalkTalk warns that fraudsters are targeting its customers, using stolen customer data to trick them into paying for technical support and sharing bank account details. Read more...

  • Questioning Gemalto's Reaction to Hack

    Company's One-Week Investigation Downplays the Impact Questioning Gemalto's Reaction to Hack

    SIM card manufacturer Gemalto says its investigation into a reported U.S. and U.K. intelligence agency espionage operation found that its internal networks housing encryption keys weren't breached. But security experts question those findings. Read more...

  • Lenovo Website Hijacked

    Lizard Squad Takes Credit, Says It Has Stolen E-Mails Lenovo Website Hijacked

    The hacking group Lizard Squad has claimed credit for hijacking the website of Lenovo.com and redirecting visitors to an attacker-controlled site. It also indicates that it's now sitting on a cache of stolen Lenovo e-mail messages. Read more...

  • Visa Europe Debuts Tokenization Service

    Fraud-Fighting Move Lays Foundation for Apple Pay Visa Europe Debuts Tokenization Service

    Visa Europe will launch in April a new mobile payments service to tokenize payment card data, enabling consumers to pay retailers with their smart phones and wearable devices. The move could pave the way for an Apple Pay rollout in Europe. Read more...

  • Report: Spies Stole SIM Encryption Keys

    Snowden-Leaked Documents: SIM Card Maker Gemalto Hacked Report: Spies Stole SIM Encryption Keys

    A British/American intelligence team hacked Gemalto - the world's largest SIM manufacturer - and stole encryption keys that can be used to intercept and eavesdrop on cellular communication, according to a news report citing leaked documents. Read more...

  • Article

    Hackers Breach Canadian ISP Rogers

    Data Theft Traces to Social Engineering Attack By Mathew J. Schwartz
    Hackers Breach Canadian ISP Rogers

    Canadian Internet service provider Rogers Communications has confirmed that information about the company and its customers was leaked after attackers successfully targeted one of its employees via a social engineering attack.

  • Article

    Anthem Attribution to China: Useful?

    Report Links Breach to Chinese Professor; Experts Respond By Mathew J. Schwartz
    Anthem Attribution to China: Useful?

    A new report details new clues suggesting that the massive data breach involving health insurer Anthem was launched by Chinese hackers. But will such evidence help businesses blunt future APT attacks?

  • Article

    Uber Breach Affects 50,000 Drivers

    Ride-Sharing Service Files Lawsuit, Seeks GitHub Records By Mathew J. Schwartz
    Uber Breach Affects 50,000 Drivers

    Information on 50,000 drivers for ride-sharing service Uber was breached in May 2014, the company discovered in September and announced on Feb. 27. Uber has launched a related lawsuit and is seeking records from code-sharing website GitHub.

  • Article

    Lenovo Promises: No More Bloatware

    PC Maker Offers Clean Windows Builds, Full Transparency By Mathew J. Schwartz
    Lenovo Promises: No More Bloatware

    Lenovo, the world's largest PC manufacturer, promises to stop preinstalling any software on its Windows laptops that doesn't need to be there. The move comes following security alerts relating to the Superfish adware the company had been preinstalling.

  • Article

    Hackers Steal Trading Algorithms

    Attacks Aimed at Hedge Funds, Trading Firms By Mathew J. Schwartz
    Hackers Steal Trading Algorithms

    Hackers have been stealing the secret trading algorithms that are the lifeblood of many hedge funds and high-frequency trading firms, according to two security companies. What can be done to mitigate the risks?

More news...

Webinars

More webinars...

White Papers

  • M-Trends 2015: A View From the Front Lines

    Talking about the threat landscape is no substitute for experiencing it first-hand. "M-Trends 2015: A View from the Front Lines," distills the insights gleaned from hundreds of Mandiant incident...

  • Striking the Big Data vs. Good Data Balance

    This infographic highlights key actions to take in order to align the "keep everything" needs of Big Data with the "defensible disposal" mandates of Information Governance. Download this...

More whitepapers...
ARTICLE Authentication in a Heartbeat

MasterCard is testing a biometric wristband that authenticates a user's identity for payment card...

Latest Tweets and Mentions

ARTICLE Authentication in a Heartbeat

MasterCard is testing a biometric wristband that authenticates a user's identity for payment card...

The ISMG Network