- Hillary Clinton: 'Our technology companies are not part of our government'
- Router malware: Fact or fiction?
- Los Alamos National Lab's R&D fueling new quantum-crypto firm
- Drupal offers bounty for breaking its new two-factor authentication
- Java, Flash and Reader still PC admins' biggest security headaches
fraud - News, Features, and Slideshows
There's a push to adopt chip-equipped payment cards in the US following high-profile breaches at large retailers and restaurant chains during the past 12 months, but experts warn that switching to this payment system will not make fraud disappear.
Security researchers demonstrated Thursday flaws that can allow hackers to take over mobile point-of-sale (mPOS) devices from different manufacturers by inserting rogue cards into them.
Hackers have stolen user contact information, including email addresses and phone numbers, from the website of the European Central Bank and attempted to extort money from the institution.
Romanian and French authorities have dismantled a cybercriminal network that infected computers at money transfer outlets across Europe and used them to perform illegal transactions.
A new Trojan program designed to steal log-in credentials and other financial information from online banking websites is being advertised to cybercriminal groups on the underground market.
Cybercriminals are improving a malicious software program that can be installed on ATMs running Microsoft's Windows XP operating system that records sensitive card details, according to security vendor Trustwave.
A bank-machine hacker who reportedly was arrested earlier this month in Turkey gave would-be fraudsters tips on how to install rogue card-reading devices, including advising them to target drive-through ATMs (automated teller machines) and avoid towns with fewer than 15,000 residents.
Whitepapers about fraud
In the second half of 2013, the advancement of security breaches across all industries continued to rise. Within this report, we’ll explain how more than half a billion records of personally identifiable information (PII) such as names, emails, credit card numbers and passwords were leaked in 2013 - and how these security incidents show no signs of stopping.
- EXCLUSIVE: Tonnex International falls into liquidation after lengthy court battle
- SAP backs innovation centre launch with $60m investment in Victoria (+15 photos)
- Inabox Group revenue reaches $46.9m but profit slips again
- EXPERIENCE IBM CLOUD 2014: Cloud an enabler, analytics a gold mine (+10 photos)
- UXC posts 31 per cent profit drop due to redundancies, acquisitions
- HubSpot's US$100m IPO listing welcomed, but profitability questions raised
- Quantium helps Woolworths get personal with customers, CEO says
- Nissan Motorsport revs up sponsorships with CRM
- Twitter Analytics will leave you wishing for more
- How PaaS is helping Volkswagen to deliver customer leads on mobile