CIO-Regardless of the security expertise and resources you apply to securing your assets,you are unlikely to achieve much unless you focus on the most vulnerable element of your organization:your employees. "Computers have become much ...
Tags: secure data, the human element
Two Romanian men have pleaded guilty to participating in a $10 million scheme to hack into the computers of hundreds of Subway restaurants in the U.S. and steal payment card data, the U.S. Department of Justice said. Iulian Dolan, 28, of ...
Tags: Subway hack, Romanians, Computer Products
Computerworld - Sprint today denied that subscribers of its Virgin Mobile subsidiary were wide open to account hijacking attacks as claimed by an independent software developer this week. In emailed comments, Sprint spokeswoman Stephanie ...
Hosted virtual desktop provider releases whitepaper on recent data center expansion. CyberlinkASP, the leader in hosted virtual desktops and private cloud solutions, today announced that it has released a Case Study on its recent ...
Tags: CyberlinkASP, Case Study, Data Center Expansion, Computer Products
Three widely deployed payment terminals have vulnerabilities that could allow attackers to steal credit card data and PIN numbers, according to a pair of security researchers from penetration testing firm MWR InfoSecurity in the U.K. The ...
Tags: payment terminals, MWR InfoSecurity, credit card data, PIN numbers
Recent PCI Security Standard Council's North American Community Meeting revealed PCI compliance changes. PCIHosting.com helps individuals and organizations prepare for the changes. New standards in PCI compliant services and ...
Tags: PCIHosting, PCI, Computer Products
The Payment Card Industry Security Standards Council (PCI SSC) has released guidance making PCI compliant hosting a must for secure mobile transactions. CHICAGO, IL, November 22, 2012 /24-7PressRelease/ -- The PCI SSC recently issued best ...
Tags: secure mobile transactions, Payment Card, Security Standards
Researchers from Israel-based IT security firm Seculert have uncovered a custom-made piece of malware that infected hundreds of point-of-sale (PoS) systems from businesses in 40 countries in the past few months and stole the data of tens of ...
Tags: IT security firm, Seculert, malware, PoS systems
Starbucks said Friday it will update Passbook in iOS 6 at the end of September, presumably meaning it will integrate its existing Starbucks digital payment card into the new app for users to pay for coffee. In a tweet, the company said: ...
Tags: Starbucks, iOS 6, Passbook, digital payment card
IT Governance Ltd, the PCI and information security experts, have reported that organisations required to comply with the PCI DSS standard, are increasingly deploying PCI DSS Staff Awareness e-learning to meet requirement 12.6 of the ...
Tags: PCI DSS, PCI DSS Standard, information security experts
An industry group launched on Tuesday will guide a massive upgrade of the U.S. payment card system to a new platform designed to prevent card fraud. The EMV (Europay, MasterCard, Visa) Migration Forum will coordinate efforts to enable the ...
Tags: industry group, massive upgrade, U.S., payment card system
Japanese mobile operator NTT DoCoMo's subscribers will be able to make mobile payments when travelling abroad next year, thanks to a collaboration with MasterCard. Together the two companies will expand DoCoMo's iD mobile credit payment ...
Tags: NTT DoCoMo, mobile payments, MasterCard, NFC
Transport for London aiming to get NFC rolled out across entire network by the end of 2013 Commuters in London are now able to pay for their bus journeys using contactless payments. The development means Londoners can pay for their bus ...
Tags: Transport for London, bus journeys, credit or debit card, Oyster cards
Amazon Web Services has submitted an entry to the Cloud Security Alliance's Security, Trust & Assurance Registry (STAR), a move that sheds some light into the security features of its IaaS cloud offering. The CSA launched its STAR program ...
Tags: Amazon Web Services, Cloud Security, STAR, CSA
The technique of using deception and manipulation to gain sufficient knowledge to dupe an unwary individual, employee or company into revealing personal information has the potential to be one of the biggest security threats in 2013 ...
Tags: big data, cloud, Gartner, social engineering, Windows