At a Senate committee hearing on Tuesday, lawmakers grilled a Facebook executive about the company's plans to launch a cryptocurrency. One Democratic senator said Facebook "does not respect the power of the technologies they are playing with - like a toddler who has gotten his hands on a book of matches."
The sentencing of a former worker at a substance abuse treatment provider in connection with a Medicaid fraud conspiracy "is an important reminder about the threats from insiders," one privacy attorney says.
In the run-up to Amazon Prime Day, some of the company's customers were being targeted by a phishing kit called 16Shop, according to McAfee researchers. The campaign is similar to an earlier attack that focused on Apple users.
It is estimated that a business falls victim to a ransomware attack every 40 seconds, adding up to a projected $11.5 billion in damages for this year. As ransomware attacks become more targeted and damaging, your organization faces increased risk that can have your networks down for days or even weeks.
So, how can...
Britain's privacy watchdog has proposed a record-breaking $230 million fine against British Airways for violating the EU's General Data Protection Regulation due to "poor security arrangements" that attackers exploited to steal 500,000 individuals' payment card data and other personal details.
The cyberattack earlier this year against Indian outsourcer Wipro, as well as several of its customers, is part of a much larger, multiyear phishing campaign that involves many more companies used as jumping off points, according to RiskIQ, which says the attackers apparently are manipulating gift cards.
What are the new data security, patient safety and privacy worries evolving with each new cyberattack on the healthcare sector? Our panel of experts - Jigar Kadakia, CISO of Partners HealthCare; Michael McNeil, global security officer at Philips; and Chris Frenz, CISO Interfaith Medical Center - will discuss what...
Healthcare records remain one of the "holy grail" personally identifiable information (PII) data types for criminals. With patient data being more valuable to attackers than ever, alongside stricter HIPAA and HITECH compliance requirements and an ever-growing device inventory to manage, IT teams modernization...
Many cybersecurity tools are designed to block or allow specific activities based on prescribed rules, but with insider breaches continuing, enterprise protection also requires real-time reaction to actual user behavior, says Carl Leonard of Forcepoint.
An Account Takeover (ATO) attack is exactly
what it sounds like: a bad actor acquires an
authorized user's login credentials, most
often by leveraging reused or similar passwords from previously breached sites.
With millions of usernames and passwords
stolen each year, ATOs are more common than
ever. Yet a...
A new report from Accenture highlights five key areas where cyberthreats in the financial services sector will evolve. Many of these threats could comingle, making them even more disruptive, says Valerie Abend, a managing director at Accenture who's one of the authors of the report.
To stay current, eCommerce retailers have to keep track of evolving shopping trends. And to stay profitable in a rapidly changing marketplace, merchants have to approve more orders, operate more efficiently, and fend off the costly threats of fraud, account takeovers, chargebacks, and false declines.
Legacy fraud detection systems often approve or decline orders based solely on a handful of details. Savvy merchants expect much more from their fraud management solutions than simply a risk score.
Today, merchants demand a solution that supports expansion into global markets, promotes a smooth shopping experience,...
As the global eCommerce market grows and fraudster methodology evolves, new fraud management approaches and tools are being introduced at a fast pace. This guide provides a comprehensive series of resources designed to guide decision makers through the assessment of assessing fraud management and identifying...