The National Institute of Standards and Technology should use the cryptographic community to help vet the advice it gets from the National Security Agency when creating cryptography guidance, a panel of prominent experts recommends.
Three Chinese nationals seeking to make "big bucks" broke into the computers of Boeing and other military contractors, stealing secrets on transport aircraft, a U.S. criminal complaint says. Read how they allegedly did it.
British police have worked with an international consortium of law enforcement agencies and information security firms to disrupt financial malware known as Shylock used to infect more than 60,000 PCs and steal millions of dollars.
The British government is seeking quick approval of an "emergency" blanket data retention law that would require U.K. telecommunications providers to store information relating to their customers' calls, texts and e-mails for 12 months.
The Department of Homeland Security confirms that "a potential intrusion" of the Office of Personnel Management's network occurred in March but says officials have not identified any loss of personally identifiable information.
Criminals have begun targeting ATMs in Western Europe using malware, as well as a new generation of stealthier skimmers designed to capture card data and PIN codes. But the stolen data is often used for fraud elsewhere, especially the U.S.
Bob Russo, long-time general manager of the PCI Council, will retire at the end of the year. Stephen Orfei, his replacement, will take the helm in September. Security experts analyze the potential impact of the change.
Oracle has stopped supporting XP, but promises the next update for Java 7 -- though not Java 8 -- will still run on XP. But for how long will this continue? Security experts chart XP's "downward spiral."
Leading this week's industry news roundup, Easy Solutions partners with Q2 to provide virtual banking solutions, while Lockheed Martin releases a new version of the Industrial Defender Automation Systems Manager.