The U.S. Senate has approved new cybersecurity legislation that will make it so infrastructure organizations have to report cyberattacks within 72 hours and ransomware payments within one day, ZDNet reported Wednesday (March 2). Get the Full Story Complete the form to unlock this article and...
Following the recent Nvidia hack, it has now been revealed that hackers stole employee credentials and proprietary information and posted it online, Bloomberg reported Tuesday (March 1). Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all...
Toyota said it will suspend production at its Japanese factories after a cyberattack directed at a supplier of plastic and electronic components, triggering a loss of about 13,000 cars, according to a on Monday (Feb. 28) Reuters report. Get the Full Story Complete the form...
Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional logins required. yesSubscribe to our daily newsletter, PYMNTS Today. By completing this form, you agree to receive marketing communications from PYMNTS and...
The Polish government and the nation’s payment clearinghouse have experienced more cyberattacks recently, the federal chief of cybersecurity said Friday (Feb. 25), Reuters reported. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content —...
Open a newspaper, turn on the TV or click on a link, and you’ll see any number of headlines — seemingly every day — that shine a spotlight on just how vulnerable our data can be, and how hackers are leveraging business email compromises and...
Scams targeting users of mobile payment apps such as Cash App, QuickPay, Venmo and Zelle are surging, the Better Business Bureau and Illinois utility Commonwealth Edison warned Thursday (Feb. 24). Get the Full Story Complete the form to unlock this article and enjoy unlimited free...
Online verification service ID.me, which counts the IRS among its clients and recently endured criticism over certain practices, Thursday (Feb. 24) announced a decidedly low-tech way to blunt critics. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access...
The mobile phone, increasingly, is becoming the means through which criminals are impersonating unwitting victims, and stealing from them. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional logins required. yesSubscribe...