In the wake of an "inebriated" government employee crashing a drone on the White House lawn, federal officials sound warnings over the potential weaponization of consumer drones. But is it anything more than a Hollywood-style movie plot?
The Regin espionage and surveillance malware offers attackers advanced capabilities, but a new analysis of two recovered modules finds the components are basic and unveils potential clues to the identity of its creator.
As a result of President Obama's "Buy Secure" initiative, the federal government this month is kicking off its chip-and-PIN rollout. Fraud experts now debate what impact the move will have on banks' EMV chip-card strategies.
Adobe confirms that a zero-day flaw exists in its Flash browser plug-in and promises to soon release Windows, Mac and Linux fixes for affected versions of Flash Player. The vulnerability is reportedly already being targeted by in-the-wild attacks.
A third member of an international hacking ring has pleaded guilty in connection with his role in conspiring to break into computer networks of technology companies, including Microsoft, to steal intellectual property.
In the aftermath of a payment card breach, as fraudsters race to exploit the stolen information, card issuers and affected customers take steps to mitigate risks. Here's a look at the lifecycle of a payment card breach from three perspectives.
The U.S. likely won't complete its implementation of EMV for many years to come, despite the October 2015 liability shift date for counterfeit card fraud, many forecasters say. And until it's fully deployed, EMV will have little impact on fraud.
British Prime Minister David Cameron reportedly plans to lobby U.S. President Barack Obama to criticize technology companies that offer encrypted communications that cannot be cracked by law enforcement or intelligence agencies.
The globalization of fraud waged by organized crime has spurred new cross-channel attacks and is affecting how ATM operators approach data security, executives from three of the world's leading ATM manufacturers explain in this exclusive interview.
North Korean leader Kim Jong-un was set to star in a satirical video game, in which he battled the forces of imperialist oppression with the help of unicorns and narwals - until hackers apparently disrupted game development.
The U.S. migration from magnetic-stripe payment cards to EMV-compliant cards is in full swing, thanks in part to massive breaches at retailers. This infographic offers a timeline of progress in implementing this new technology.