LinkedIn's failure to comply with long standing industry standard encryption protocols jeopardized its users' PII, and diminished the value of the services, the class action federal lawsuit filed in northern California says.
Gartner's Peter Firstbrook, to illustrate the vulnerability of IT systems, cites research that pegs at about 400 days the average time a targeted virus remains undetected on a computer. And, he says, that doesn't speak highly of the current offerings from security vendors.
Four recent breach incidents, including one affecting LinkedIn, have put the spotlight on the effectiveness of hashing. Why is hashing increasingly ineffective at protecting online passwords?
Payments processor First Data warns about an uptick in trolling - hackers sniffing networks for easy access to merchants' point-of-sale systems. What can banks do to help merchants prevent breaches?
Even while working to re-establish its own PCI compliance, breached payments processor Global Payments Inc. is helping merchants assess and improve their payment card security.
Gartner fraud expert Avivah Litan shares ideas about how lessons learned from the Global Payments data breach can help security practitioners mitigate card-fraud risks and prevent future incidents.
The average per capita cost of a data breach has declined from $214 to $194, according to the new Cost of a Data Breach study. But there are still plenty of causes for concern, says Dr. Larry Ponemon.
A recent research paper that raised questions about the efficacy of RSA public-private key cryptography shouldn't alarm IT security practitioners, says Eugene Spafford of Purdue University. Here's why.
RSA, PhoneFactor and Rapid7 were among the organizations to issue product/solution news releases at RSA Conference 2012 on Tuesday, Feb. 28. See the latest announcements from the show.
IT security practitioners who employ the RSA public-private key cryptography needn't lose sleep about its efficacy, despite new research that raises questions on how it creates large prime numbers to generate secret keys, IT security authority Gene Spafford says.
RSA Chief Technologist Sam Curry defends the company's approach to public-key cryptography after researchers suggest a flaw in its encryption algorithm, contending the problem exists elsewhere in the security chain.
In the wake of the latest high-profile hacktivist attacks against banking institutions, industry experts offer these tips to bolster online security, customer awareness and the corporate image.
To help prevent breaches, mobile devices should be encrypted even if storage of sensitive information on them is prohibited, says security expert Melodi Mosley Gates.
We all know the online shopping risks consumers face on CyberMonday. But how does the BYOD mobile computing trend impact risks to organizations from their own employees shopping on the job?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.co.uk, you agree to our use of cookies.