A third member of an international hacking ring has pleaded guilty in connection with his role in conspiring to break into computer networks of technology companies, including Microsoft, to steal intellectual property.
In the aftermath of a payment card breach, as fraudsters race to exploit the stolen information, card issuers and affected customers take steps to mitigate risks. Here's a look at the lifecycle of a payment card breach from three perspectives.
The U.S. likely won't complete its implementation of EMV for many years to come, despite the October 2015 liability shift date for counterfeit card fraud, many forecasters say. And until it's fully deployed, EMV will have little impact on fraud.
British Prime Minister David Cameron reportedly plans to lobby U.S. President Barack Obama to criticize technology companies that offer encrypted communications that cannot be cracked by law enforcement or intelligence agencies.
The globalization of fraud waged by organized crime has spurred new cross-channel attacks and is affecting how ATM operators approach data security, executives from three of the world's leading ATM manufacturers explain in this exclusive interview.
North Korean leader Kim Jong-un was set to star in a satirical video game, in which he battled the forces of imperialist oppression with the help of unicorns and narwals - until hackers apparently disrupted game development.
The U.S. migration from magnetic-stripe payment cards to EMV-compliant cards is in full swing, thanks in part to massive breaches at retailers. This infographic offers a timeline of progress in implementing this new technology.
ATM vendors are working together to enhance threat information sharing and ensure hardware and software compatibility. In part two of an exclusive three-part interview, three leading ATM manufacturers explain why collaboration has become so important.
Bankers are criticizing one federal regulatory agency for how it has responded to a breach of unencrypted consumer data that occurred during a routine banking exam. They're saying regulators should focus more on their internal security practices.
Nobody wants to be a cyber-attacker's first victim. But there are benefits to being second or third, says Akamai's Mike Smith. Then you get to enjoy the true benefits of the oft-discussed information sharing.
How will EMV and contactless payments reduce ATM-related card fraud? In part one of this three-part exclusive interview, executives from the world's top three ATM manufacturers discuss how they're helping banking institutions address emerging fraud trends.
A recent interview about why retailers say EMV without the PIN is a fruitless fraud-fighting effort has spurred debate among retailers and bankers. In the end, though, bankers' resistance to PIN is all about time and money.
Financial services company Morgan Stanley has fired an employee who it claims stole account data for hundreds of thousands of clients and posted a small subset of it online. Find out how many clients were affected.
Microsoft says it's prepping a patch for a Windows vulnerability that was recently disclosed by Google. The search giant's 90-day deadline for vendors to patch bugs has drawn both condemnation and praise from the information security community.