A low-tech campaign combines phishing, small-footprint attack code and Android malware to topple banks' security defenses in Switzerland and three other nations. Will the campaign extend to U.S., U.K., and beyond?
Google and Microsoft met with European regulators in Brussels July 24 to discuss their compliance with the "right to be forgotten" ruling and whether it should apply to all of their search engine sites - and not just those in Europe.
The website of the European Central Bank has been breached and contact information for event registrants stolen. The breach only came to light when a hacker attempted to obtain a ransom to return stolen data to the bank.
Leading this week's industry news roundup, Quantum Corp. is integrating its StorNext scale-out storage with the FireEye network forensics platform, while CARD.com is partnering with IDology to help prevent card fraud.
Sources say a yet-to-be-confirmed breach of payment card data linked to transactions at Goodwill Industries could be linked to a point-of-sale vulnerability that may have affected other numerous merchants.
Point-of-sale retail breaches are the rage, but they are just one cyber-crime trend on the mind of RSA researcher Uri Fleyder. What are the malware and mobile threats that organizations should monitor?
The EU Joint Cybercrime Action Taskforce pilot is set to coordinate cross-border investigations - across Europe, the United States and beyond - into cybercrime, including payment card fraud, DDoS attacks and malware rings.
An online gang with ties to Romania and Russia has been bypassing two-factor, Android-based authentication systems - used by 34 different banks to authenticate customers - via the sophisticated Operation Emmental cybercrime campaign.
A challenge examiners face in conducting forensic investigations in the cloud is that they don't have access to the servers. That's just one problem the National Institute of Standards and Technology is addressing.
A controversial U.K. "emergency" surveillance bill has become law, just seven days after being introduced to Parliament. But a privacy rights group has already promised to challenge the new law in court.
Two zero-day vulnerabilities reportedly were exploited by the attackers who hacked NASDAQ's systems in 2010. While a senior U.S. legislator claims the hackers had "nation-state" backing, security experts say it's still not clear who hacked NASDAQ or why.