A report on new White House rules on when to disclose cybersecurity vulnerabilities to software vendors leads the latest edition of the ISMG Security Report. Also, storing passcodes in clothing.
With the aim of protecting data privacy, the government of Singapore is considering taking steps to greatly reduce the use of the National Registration Identity Card numbers for verifying consumers' identities.
The face-off between security researchers and biometric authentication continues, with a group from Vietnam claiming to have fooled the facial-recognition system, called Face ID, that's built into Apple's latest iPhone by using a handmade mask that includes 3D printouts and a silicone nose.
In a world of constant data breaches, where all consumer PII data is exposed, financial institutions are seeking innovative ways to authenticate customers, verify identity and prevent account takeover. This is leading to investment in a world of innovative authentication methods but that also means FIs find themselves...
Many enterprises use remote desktop protocol to remotely administer their PCs and mobile devices. But security experts warn that weak RDP credentials are in wide circulation on darknet marketplaces and increasingly used by ransomware attackers.
Nearly 50,000 personal records relating to Australian government employees as well as the employees of two banks and a utility were exposed to the internet due to a misconfigured Amazon storage server. The episode is the latest in a string of large breaches to hit Australia.
What happens when you need to verify a new customer? Without prior information or customer records, and when the information you rely on is publicly available, it can be challenging to determine whether an account was created by a new customer or by a cybercriminal. Download this whitepaper and learn how IBM Trusteer...
Social Security numbers, birthdates and other personal information are leaked daily in breaches around the world. That's why Frances Zelazny of BioCatch suggests a new means of digital identification.
As your bank or financial institution works to deliver digital services, you need to know that the "customer" logging into your online or mobile banking app is who they say they are. However, cyber criminals are continually introducing new and increasingly sophisticated financial malware along with convincing social...
Effectively fighting fraud has a lot to do with the speed of detection, investigation and countermeasure deployment. By integrating cognitive capabilities with fraud protection, it is possible to shift the balance of power and gain an upper hand in the battle against fraudsters.
Download this whitepaper and learn...
PSD2 presents opportunities and introduces new requirements for banks. Proactive, early-adopting organizations will be able to meet the new demands rapidly. By creating new alliances and providing innovative services, they will be able to provide value for both themselves and their customers.
Download this...
This eBook introduces IT professionals to next-generation multi-factor authentication (MFA), an approach to authentication that goes well beyond usernames and passwords to provide the right level of security assurance at the right time, anytime. But that's not all: Next-generation MFA also streamlines authentication...
A new directive from the U.S. Department of Homeland Security elevates federal agencies' email security to the DMARC standard that's widely adopted by commercial email providers, including Google, Yahoo and Microsoft.
A Belgian security researcher has discovered a "serious weakness" in the WPA2 security protocols used to encrypt many WiFi communications. Attackers can exploit the flaws to eavesdrop as well as potentially inject code such as malware or ransomware into WiFi-connected systems. Prepare for patches.
An analysis on finding a replacement for Social Security numbers as an identifier for individuals leads the latest edition of the ISMG Security Report. Also, assessing Kaspersky Lab's responsibility for the hack of an NSA contractor's computer.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.