The Latest News

  • Indian Banks Wary of Payment Card Risks

    Government Initiative Stirs New Security Concerns Indian Banks Wary of Payment Card Risks

    While the Indian finance ministry has announced incentives for banks to curb cash transactions and encourage the use of payment cards, security experts caution CISOs about authentication and fraud risk. Read more...

  • Section 66A of IT Act Struck Down

    Supreme Court Rules Section Is Unconstitutional Section 66A of IT Act Struck Down

    In a landmark judgment, the Supreme Court of India struck down the controversial Section 66A of India's Information Technology Act, saying it violated the right to free speech as guaranteed by India's constitution. Read more...

  • Alert: Indian ATMs Face New Attacks

    NCR Issues Advisory About USB 'Black Box' Attacks Alert: Indian ATMs Face New Attacks

    Security experts warn ATM operators to ensure their machines are locked down in the wake of ATM manufacturer NCR's warning that it is investigating a series of USB-port hack attacks on ATMs in India. Read more...

  • Singapore: Data Protection Group Formed

    Prescribes Policies for Nation's Data Protection Commission Singapore: Data Protection Group Formed

    Singapore's Personal Data Protection Commission has formed an advisory committee to prescribe guidance for the Data Protection Act. Security experts set the agenda and suggest suitable protection measures. Read more...

  • India's Cyber Tribunal Seeks New Chair

    Increase in Fraud Case Load Spurs Government Action India's Cyber Tribunal Seeks New Chair

    After a three-year gap, the government of India seeks to fill the post of chairperson for the Cyber Appellate Tribunal. Cyberlaw groups believe the increase in cyberfraud and pending verdicts triggered the move. Read more...

  • Article

    Tech Start-Up Slack Technologies Hacked

    Company Rolls Out Two-Factor Authentication Post-Attack By Marianne Kolbasuk McGee
    Tech Start-Up Slack Technologies Hacked

    Slack Technologies, a tech start-up that offers a group chat tool, announces it's rolling out two-factor authentication after hackers breached a database of user profile information.

  • Blog

    Google's Psychological Patch Warfare

    'Project Zero' Rewrites Vulnerability Disclosure Norms By Mathew Schwartz
    Google's Psychological Patch Warfare

    Psychologically speaking, nothing beats the power of a well-timed deadline. And love it or hate it, Google's 90-day "Project Zero" deadline for fixing flaws - before they get publicly disclosed - has rewritten bug-patching rules.

  • Article

    Why POS Malware Still Works

    Security Experts: It's Too Easy To Infect Retail Systems By Mathew J. Schwartz
    Why POS Malware Still Works

    New, advanced point-of-sale malware dubbed "Poseidon" can exfiltrate card data directly from every infected device. And security experts warn that too many retailers fail to test POS devices and segment networks to mitigate all malware threats.

  • Article

    Free Defense for Alleged $18M Hacker?

    Prosecutors Say Russian Has Resources to Pay Attorneys By Mathew J. Schwartz
    Free Defense for Alleged $18M Hacker?

    U.S. prosecutors are asking a judge to rescind his decision to provide a free defense for a Russian citizen who faces 40 charges relating to the alleged theft and sale of at least 2 million credit card numbers.

  • Article

    Public Sector Lacks Security Policy

    SCOPE's Dhingra: Security Awareness Lacking at Indian PSUs By Geetha Nandikotkur
    Public Sector Lacks Security Policy

    K L Dhingra of the Standing Conference of Public Enterprises doesn't see India's public sector units prioritizing data security, as no mandates yet exist for evolving a standard security framework.

More news...

Webinars

  • PREMIUM MEMBER EXCLUSIVE

    Big Data Analytics & Fraud Detection

    Organizations today suffer from data overload. Multiple information systems deliver mountains of data about the latest threats, anomalous activities and potential security incidents. But without the...

  • Malware, Crimeware and Phishing - In Depth Look at Threats, Defenses

    The evolution of malware and crimeware has produced more insidious and harmful intrusions to networks and systems. This webinar will show how these types of intrusions relate to phishing and will...

More webinars...

White Papers

More whitepapers...
ARTICLE Staples Confirms POS Malware Attack

Staples has confirmed that its retail point-of-sale systems were compromised earlier this year by...

Latest Tweets and Mentions

ARTICLE Staples Confirms POS Malware Attack

Staples has confirmed that its retail point-of-sale systems were compromised earlier this year by...

The ISMG Network