Authorities say Yevgeniy Aleksandrovich Nikulin stole credentials from a LinkedIn employee and used them to breach the social networking firm in 2012, in which well over 100 million members' passwords were exposed.
Some 3.2 million Indian debit cards may have been compromised, according to the National Payments Council of India. While investigations are ongoing and several banks have reissued at-risk cards, the cause of the card exposure has not been officially confirmed.
Former NSA contractor Harold T. Martin III., who is accused of pilfering mass quantities of highly classified information, will remain in jail until his trial. Martin engaged in "a course of felonious conduct that is breathtaking in its longevity and scale," prosecutors say.
The FBI calls and notifies you of a payment card breach, and every compromised card is linked to a transaction with your organization. Quickly: Who stole the data? How did they get access?
Register for this session to participate in a mock payment card breach investigation using Dell Software's IT Security Search....
As U.S. ATM operators face MasterCard's Oct. 21 EMV liability shift deadline, a surge in explosive attacks against European ATMs is a reminder that anti-fraud features won't block all money machine crime.
As the cost of cybercrime escalates across all industries, banks are suffering the most. Banks are paying particular attention to payment fraud through online and mobile channels - wire transfer fraud has more than doubled year over year and 73% of organizations experienced payments fraud in 2015. (AFP 2016 Payment...
Markus Jakobsson, Chief Scientist at Agari, has released a new book focused on socially-engineered schemes. What are the key takeaways, and how can security leaders improve their abilities to fight back against the schemers?
A new kind of malware for Mac OS X has been linked to Fancy Bear, the Russian group suspected of hacking the DNC and the World Anti-Doping Agency. But the malware only poses a low risk to users, experts say.
Want to build a cybercrime empire predicated on selling stolen payment card data? Here's how carder forum Vendetta Network blends outsourcing, partnerships and best-of-breed tools to maximize profits while minimizing risk.
Social engineering is the lever that fraudsters are using to penetrate organizations and commit big-dollar crimes - and no amount of anti-virus protection is going to defend against these sophisticated targeted attacks. How prepared are you to defend against social engineering attacks such as spear phishing, business...
A new cyberattack trend report from Europol notes that while online criminals continue to refine their capabilities, old and unsophisticated attacks too often still succeed, thanks to poor digital hygiene and a lack of security by design and user awareness.
The more than 11,000 financial institutions that use the SWIFT interbank messaging network must annually prove they comply with its new cybersecurity standards or face being reported to regulators and business partners.
Why are hacked healthcare records so valuable? It's because stolen patient records often end up for sale on the deep web as part of information packages called "fullz" and "identity kits" used by fraudsters to commit a wide variety of crimes, says James Scott of the Institute for Critical Infrastructure Technology.
A recent court ruling illustrates yet another way patient privacy can be compromised. A federal bankruptcy court slapped WakeMed Health and Hospitals with financial penalties for exposing patient information in filings it made for cases.