DSCI is working with the FIDO Alliance in an effort to eliminate the use of passwords for authentication in India. But some security practitioners question whether that's a realistic approach that will prove effective. go
Voice biometrics: Is it good enough to protect people's bank accounts? Also, the ISMG Security Report goes to Belfast, Northern Ireland, for this year's OWASP AppSec Europe conference, including a visit to the Titanic museum - hopefully not a metaphor for the discipline.
An examination of the maturing of cybercrime leads the latest edition of the ISMG Security Report. Also, understanding the Intel Active Management Technology flaw.
Hackers have reportedly exploited the SS7 mobile telecommunications signaling protocol to drain money from online bank accounts used by O2 mobile phone subscribers. Despite rising security worries relating to SS7, many telcos have yet to explore related fixes.
Biometric adoption and demand by consumers is increasing rapidly. Next-gen solutions now exist for organizations to bring secure, frictionless authentication to their consumers using biometric solutions.
Download this eBook about biometrics and authentication that discusses:
Problems biometrics can solve for...
Make sure your Amazon S3 buckets have no holes. A California vehicle financing company has learned the hard way after exposing up to 1 million records online related to auto loan holders, according to a researcher's report.
Direct global losses from ATM skimming are estimated to be billions of dollars annually; with losses from skimming on a single, non-bank, ATM ranging from $5,000 to $100,000, and an average $650 per card. You can combat these risks with an easy-to-use mobile friendly QR code that visually verifies transactions to...
The ISMG Security Report leads with an analysis of how tactics used by Kremlin-tied actors to target political groups in France, Germany and the U.S. to influence foreign elections could be employed to damage the reputation of businesses.
More than15 years ago, the nation of Estonia rolled out a digital identity program for all citizens, allowing access to government services, banking, shopping - even voting. What lessons can global businesses learn from Estonia's example? Joseph Carson of Thycotic offers insight.
The European Banking Authority (EBA) recently published its long-awaited final draft of the Regulatory Technical Standards (RTS) on Strong Customer Authentication (SCA) and Common and Secure Communication (CSC) under the revised Payment Services Directive (PSD2).
Download this whitepaper to learn:
Background...
Phishing and ransomware are increasing at the rate of several hundred percent per quarter, a trend that Osterman Research believes will continue for at least the next 18 to 24 months. However, organizations can address the threat through a variety of means: user education, security solutions, vulnerability analysis,...
The drop in value of stolen payment cards caused cyber criminals to adopt new tools, foremost among them ransomware. Having already caused a financial drain of $209,000,000 in just one quarter, organizations of all sizes are at risk.
Download this infographic to see:
Why ransomware-as-a-service is a new risk;
The...
"No More Ransom," a coalition made up of the Dutch High Tech Crime police, Europol's Cybercrime Centre, and a growing number of cyber security companies, was formed to address the rapid growth of cybercrime conducted through ransomware.
The coalition knew their website would be an irresistible target for cyber...
Biometric adoption and demand by consumers is increasing rapidly. Next-gen solutions now exist for organizations to bring secure, frictionless authentication to their consumers using biometric solutions. Michael Lynch of InAuth shares insights.
Enterprise security leaders largely understand the business problems posed by a lack of privileged access management. But understanding and overcoming the obstacles to deploying a successful PAM rollout? That's the real challenge, says Alex Mosher of CA Technologies.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.co.uk, you agree to our use of cookies.