A lawsuit filed in Tennessee earlier this month has resurfaced questions about a bank's responsibility in protecting customers against cyberheists.
Stories by Jaikumar Vijayan
Sen. Charles Schumer (D-N.Y.) wants the U.S. Federal Trade Commission to investigate the data gathering and sharing practices of makers of personal fitness devices and applications.
The PCI Security Standards Council has updated its guidance to help merchants better determine whether third party service providers have implemented security measures to protect credit and debit cardholder data.
News that Russian hackers amassed log-in credentials belonging to more than 1.2 billion Internet users hammers home why companies that have not implemented strong authentication measures really need to get moving on it.
The time is ripe for professionalizing cybersecurity, according to Salve Regina University's Pell Center for International Relations and Public Policy.
A coalition of retail industry trade groups this week called for the creation of an open tokenization standard for protecting credit and debit card data from theft and misuse.
Microsoft has been ordered to comply with a U.S. government demand for a customer's emails stored on a company server in Dublin, Ireland.
Malicious hackers are using remote access tools to break into retail point-of-sale systems and plant malware on them, the Department of Homeland Security warned.
Chief information security officers (CISOs) continue to have a hard time gaining the respect of other C-suite executives despite the heightened focus overall on information security.
Corporate employees are taking a surprisingly lax approach towards security issues raised by the business use of personally owned mobile devices.
The Department of Homeland Security mistakenly released details on an experiment in which a 27-ton generator was destroyed via a cyberattack.
The National Security Agency Monday defended its data collection practices amid revelations that almost 90% of the data it sweeps up involves ordinary Internet users not suspected of crimes.
Hackers recently broke into payment systems at several northwestern U.S. restaurants and food service firms via a remote access account belonging to one of their vendors, another example of the need for companies to monitor third-party access to their networks.
Microsoft's tactics in using a court order to seize nearly two-dozen No-IP.com domains it said were used to distribute Windows malware tools were called ham-handed by several critics.
A draft U.S. Senate bill aimed at making it easier for organizations to share cyber threat information poses serious threats to personal privacy, several rights groups said in a letter to Congress on Thursday.