Get access to millions of new customers in minutes. Zero hassle PayPal integration from Braintree.
Welcome Guest | Sign In
TechNewsWorld.com
Yahoo Issues Security Sitrep
April 03, 2014
Yahoo has announced a new effort to upgrade its security, in the wake of a torrent of breaches and hacker attacks over recent months. Yahoo's plans include encryption of data in motion, enabling HTTPS encryption, and implementing the latest in security best practices, said Chief Information Security Officer Alex Stamos, who took over the job in March.
Big Blue Dons Big Data Gloves to Fight Fraud
March 21, 2014
IBM on Thursday launched a set of software and consulting services to help fight fraud and financial crime. The so-called smarter counterfraud initiative draws from more than 500 fraud consulting experts, 290 fraud-related research patents, and the $24 billion IBM has invested in its Big Data and analytics software and services capabilities over the past nine years.
Target Breach Lesson: PCI Compliance Isn't Enough
March 18, 2014
"Target was certified as meeting the standard for the payment card industry in September 2013. Nonetheless, we suffered a data breach." Those words by Target CEO Gregg Steinhafel affirmed what security experts know as gospel: Compliance does not equal security. "Just because you pass a PCI audit does not mean that you're secure," said HyTrust President Eric Chiu.
The Internet of Things: There's a Great Big Beautiful Tomorrow
March 18, 2014
When I was 10 years old, I took my first trip to Disney World. The futuristic rides in Tomorrow Land were my favorites. In particular, I loved "The Carousel of Progress," which, at the time, was an attraction designed by General Electric to showcase its new technologies at the 1964 New York World's Fair. The song, "There's a Great Big Beautiful Tomorrow," played as the curtains opened.
PCI 3.0, Part 2: Defining Your Cardholder Data Environment
March 17, 2014
New compliance guidelines went into effect earlier this year. While e-commerce organizations have until their 2015 audit to transition, the new controls are demanding enough operational and technical changes that smart businesses already have started preparing. If you're wondering where to start, one of your first steps should be to thoroughly define and document your cardholder data environment.
Target Missed Bull's-Eye in Data Breach
March 14, 2014
Target acknowledged Thursday that it put information on a back burner that led to the compromise of more than 100 million customer records. "We learned that after these criminals entered our network, a small amount of their activity was logged and surfaced to our team," said spokesperson Molly Snyder, which "determined that it did not warrant immediate follow up."
2013: A Perilous Year on the Internet
March 11, 2014
Surfing the Internet last year was a dangerous proposition. On average, 200 samples of malicious software were collected every minute by McAfee Labs, the company reported in its threat report for the Q4 2013. All kinds of Internet nastiness increased last year -- from ransomware and suspicious URLs to bogus digital certificates, master boot record attacks, and poisoned mobile apps, the firm said.
Bad Ads Outstrip Porn as Mobile Phone Infection Vectors
March 11, 2014
Trawling porn sites used to be the best way to pick up an electronically transmitted disease on your phone. That's changed. Every one in five times a mobile user is redirected to a malware site online, it's done through a malicious ad, according to a new report. That's three times what it was two years ago. One reason malicious ads have been able to outperform porn is they can get more traffic.
Target Reels From Customer Data Breach
February 26, 2014
Target reported financial results for the quarter during which it suffered a high-profile data breach, revealing how badly the company was stung by the security lapses. In the three months ending Feb. 1, net earnings dropped by 46 percent compared with the year-ago fourth quarter, from $961 million to $520 million. Profit dropped by more than 40 percent from the same period a year earlier.
Apple's Better Late Than Never With OS X Security Fix
February 26, 2014
Apple has pushed a large update to its OS X Mavericks OS that includes a patch for a significant security flaw. The vulnerability allows Net predators to hijack a secure communication channel from a device running the latest version of OS X and perform mischief such as intercepting user names and passwords. The flaw affects Apple programs that use SSL encryption.
Security Firms Scour Mobile Apps
February 24, 2014
Security pros weren't very kind to mobile applications last week. A number of firms knocked apps produced for the smartphone market for all kinds of risky behaviors that could lead to trouble not only for mobile device owners, but also for their employers. While Android has been a poster child for misbehaving apps in the past, competitor Apple's apps aren't as pristine as is commonly believed.
China Calls Kerry's Internet Comments 'Na´ve'
February 18, 2014
Maybe they aren't fighting words, but they sure aren't friendly. China's Foreign Ministry spokesperson, Hua Chunying, said that U.S. Secretary of State John Kerry's remarks about Chinese Internet freedom were, shall we say, a bit base. Kerry had a half-hour-plus chat with bloggers Saturday in Beijing, during which time he expressed support for more online freedom in China.
PCI 3.0, Part 1: Breathe, Relax, Get Compliant
February 18, 2014
Aimed at improving the security of payment card data and reducing fraud, PCI DSS 3.0 standard, which took effect on Jan. 1, introduces changes that extend across all 12 requirements. It no doubt will mean some shakeups for many organizations. However, transitioning to meet the new requirements will help e-businesses build a stronger, safer, lower-risk environment.
Defense Contractors Shore Up Security Post-Snowden
February 10, 2014
Defense contractors have begun to bolster their cybersecurity practices in the wake of the massive leaking of government data by former NSA contractor Edward Snowden. Seventy-five percent of defense contractors said the Snowden Affair had changed security procedures for their employees in a recent survey. "I'm surprised that number isn't higher," said security researcher Dodi Glenn.
The Perils of Mobile App Insecurity
February 04, 2014
Smartphones and tablets have become ubiquitous -- and so convenient that we often download apps and approve permissions without giving them much thought. Such behavior exposes the data we store on our prized devices to increasing risk. That blind trust is just what app makers count on. Android users, especially, are complacent about synchronizing apps on multiple devices.
An SMB's Guide to PCI 3.0 Penetration Testing
February 04, 2014
By now, if you're an IT professional and you're in an organization that has PCI-DSS in your scope -- that is, you store, process or transmit credit card data -- you probably already know that an update to the standard, Version 3.0, was released late last year. With this update come a few changes to the technical measures that organizations handling credit card information must implement.
IT Weaknesses Paved the Way for Target Hackers
January 30, 2014
The Target data breach exposed more than 100 million customers, riled up U.S. intelligence agencies, sparked a Justice Department investigation, involved the U.S. Department of Homeland Security and the FBI, triggered congressional hearings, and led several banks to re-issue their credit cards. The hacker has variously been identified as a 17-year-old Russian or one or more other cybercriminals.
Slipshod Security, Human Frailty Made @N Ripe for Plucking
January 30, 2014
GoDaddy reportedly has admitted one of its employees handed out customer information to a scammer who carried out a scheme to obtain a prime Twitter account. Naoki Hiroshima, a developer at Echofon, this week detailed how the scammer was able to force him to hand over his prime Twitter account, @N. The scammer used social engineering to accomplish his goal.
Worried Retail Shoppers Bury Heads in Sand
January 28, 2014
Consumers are getting increasingly nervous over retailers' ability to protect their personal data -- yet they are not changing their shopping habits, according to findings from an AP-GfK poll. In the wake of the Target breach, nearly half of those surveyed expressed extreme concern about their personal data while shopping in stores, and 58 percent had deep worries about online spending.
Neiman Marcus Alerts Customers to Hack Attack
January 24, 2014
Neiman Marcus has announced that some 1.1-million customer credit and debit cards may have been exposed in a hack attack. The retailer was first alerted to the intrusion at the beginning of the year. It appears that "sophisticated, self-concealing malware" able to obtain payment card information was active in the company's systems between July 16 and Oct. 30, 2013, CEO Karen Katz said.

See More Articles in Consumer Security Section >>
Facebook Twitter LinkedIn Google+ RSS