Articles

  • NPCI Launches Money Transfer Service

    Can UPI Model Enable Secure Authentication? Geetha Nandikotkur - March 5, 2015
    NPCI Launches Money Transfer Service

    NPCI's new unified payment interface for smartphones aims to simplify mobile money transfer through a single interface. But can it truly ensure a secure transaction through single-factor authentication?

  • Gulshan Rai to Head Cybersec at PMO

    CERT-In's Chief to be Special Secretary, Cybersecurity Geetha Nandikotkur - March 4, 2015
    Gulshan Rai to Head Cybersec at PMO

    Sources say Dr. Gulshan Rai, CERT-In's chief, will soon be named special secretary at the PMO to drive cybersecurity strategy. Can this move help enable Modi's vision of a cyber-secured nation?

  • Apple, Android Prep 'Freak' Fix

    Exploiting Crypto Flaw Breaks HTTPS on Devices, Sites Mathew J. Schwartz - March 4, 2015
    Apple, Android Prep 'Freak' Fix

    Many Apple and Android devices are vulnerable to a TLS/SSL "Freak" flaw, which could be exploited to subvert secure Web connections. The flaw is a legacy of U.S. government export restrictions on strong crypto.

  • Hackers Breach Canadian ISP Rogers

    Data Theft Traces to Social Engineering Attack Mathew J. Schwartz - March 3, 2015
    Hackers Breach Canadian ISP Rogers

    Canadian Internet service provider Rogers Communications has confirmed that information about the company and its customers was leaked after attackers successfully targeted one of its employees via a social engineering attack.

  • Smart Cities: The Security Challenge

    What Are the Cybersecurity Threats and Opportunities? Geetha Nandikotkur - March 3, 2015
    Smart Cities: The Security Challenge

    The Indian government envisions developing 100 smart cities throughout the country by 2022. What is the model, and how must security leaders prepare to defend these smart cities against cyberthreats?

  • Anthem Attribution to China: Useful?

    Report Links Breach to Chinese Professor; Experts Respond Mathew J. Schwartz - March 3, 2015
    Anthem Attribution to China: Useful?

    A new report details new clues suggesting that the massive data breach involving health insurer Anthem was launched by Chinese hackers. But will such evidence help businesses blunt future APT attacks?

  • Apple Pay: Fraudsters Exploit Authentication

    Mobile a Breeding Ground for Counterfeit Card Fraud Tracy Kitten - March 2, 2015
    Apple Pay: Fraudsters Exploit Authentication

    New exploits linked to Apple Pay aren't compromising the mobile device's security, but instead are taking advantage of lax authentication practices used by banking institutions to verify cards that are loaded to the iPhone for Apple Pay purchases.

  • Uber Breach Affects 50,000 Drivers

    Ride-Sharing Service Files Lawsuit, Seeks GitHub Records Mathew J. Schwartz - March 2, 2015
    Uber Breach Affects 50,000 Drivers

    Information on 50,000 drivers for ride-sharing service Uber was breached in May 2014, the company discovered in September and announced on Feb. 27. Uber has launched a related lawsuit and is seeking records from code-sharing website GitHub.

  • Lenovo Promises: No More Bloatware

    PC Maker Offers Clean Windows Builds, Full Transparency Mathew J. Schwartz - February 27, 2015
    Lenovo Promises: No More Bloatware

    Lenovo, the world's largest PC manufacturer, promises to stop preinstalling any software on its Windows laptops that doesn't need to be there. The move comes following security alerts relating to the Superfish adware the company had been preinstalling.

  • UK Telco Confirms Data Breach

    TalkTalk Says Fraudsters Are Using Stolen Data Mathew J. Schwartz - February 27, 2015
    UK Telco Confirms Data Breach

    The U.K. telco TalkTalk warns that fraudsters are targeting its customers, using stolen customer data to trick them into paying for technical support and sharing bank account details.

ARTICLE Top U.S. Government Data Breaches

From an intrusion at the U.S. Postal Service to the NSA leaks by former contractor Edward Snowden,...

Latest Tweets and Mentions

ARTICLE Top U.S. Government Data Breaches

From an intrusion at the U.S. Postal Service to the NSA leaks by former contractor Edward Snowden,...

The ISMG Network