The adoption of chip-enabled cards has rendered credit card signatures useless.
- By Sydny Shepard
- Apr 17, 2018
One key to improving cardless ATM acceptance among consumers is to build trust and comfort by ensuring that best-in-class security measures are in place. Given the right security and layers of defense, the cardless ATM process can be secure.
- By Michael Lynch
- Apr 16, 2018
Mark Zuckerberg released his remarks to Congress following the Cambridge Analytica scandal.
- By Sydny Shepard
- Apr 10, 2018
Delta has not said how many of its customers were involved in the breach, but Sears Holdings confirmed that as many as 100,000 customers could have been impacted.
- By Jessica Davis
- Apr 06, 2018
Card information from charges in-store at Sakes Off 5th and Lord & Taylor have been found vulnerable online.
- By Sydny Shepard
- Apr 03, 2018
Under Armor has admitted that nearly 150 million users of the smartphone application "MyFitnessPal" were hacked.
- By Sydny Shepard
- Apr 03, 2018
Privacy. It’s gone beyond buzzword into a class of its own: basically, privacy of the individual is of the ultimate importance, and all else must fall away in our efforts to preserve it.
- By Arie Melamed
- Apr 01, 2018
It is one of the largest cyberattacks against a major U.S. city.
- By Sydny Shepard
- Mar 30, 2018
Users are downloading their Facebook data to see just how much Facebook is recording.
- By Sydny Shepard
- Mar 27, 2018
The cyber theft campaign was targeting American universities, companies and government entities.
- By Sydny Shepard
- Mar 26, 2018
High-ranking security executives at Google, Facebook and Twitter—three of the Internet’s most important technology companies—have announced this week plans to leave their respective positions.
- By Jessica Davis
- Mar 23, 2018
The teenager ultimately decided to share his findings because he was afraid it would not be explained correctly to customers.
- By Sydny Shepard
- Mar 22, 2018
According to cybersecurity firm Kromtech, who found it stored in a publicly accessible Amazon S3 bucket.
- By Sydny Shepard
- Mar 20, 2018
Connected devices at home can record the voices, movements, weight and eating habits of those who live there. They are, in effect, very sophisticated sensors installed in the home environment. As such, they can be utilized by all sorts of people with various motivations and intentions of harming us.
- By Yotam Gutman
- Mar 19, 2018
Google released its fourth annual review for Android security. Here are the highlights.
- By Sydny Shepard
- Mar 16, 2018
According to an electronic filing, an unidentified American power company has reached a settlement to pay a $2.7 million penalty over significant security flaws that could have allowed hackers to gain remote access to their systems.
- By Jessica Davis
- Mar 15, 2018
Entities need to understand why these attacks are so common and how to combat them.
- By Dena Bauckman
- Mar 12, 2018
The new licensing program is called BlackBerry Secure and aims to protect devices with BlackBerry security technology.
The FBI gives basic steps to mitigate the threat of W-2 theft.
- By Sydny Shepard
- Mar 08, 2018
Cybersecurity was found to be the top technology used by healthcare facilities.
- By Sydny Shepard
- Mar 06, 2018