Prosecutors in the U.S. have charged three citizens of China with trading on corporate secrets they got their hands on by hacking the networks and servers of law firms that were working on mergers and acquisitions. Get the Full Story Complete the form to unlock...
Backpage.com Chief Executive Carl Ferrer, along with two controlling shareholders, are facing fresh charges from California Attorney General Kamala Harris, who last week filed a lawsuit alleging the online media company engaged in pimping and laundering money. Get the Full Story Complete the form to...
Account takeovers, even of high-profile people, has become a common occurrence in this era of sophisticated cyberattacks and hacks, but researchers think they’ve found a way to fight back against account takeovers: cryptographically based security keys. Get the Full Story Complete the form to unlock this...
The FBI is looking into a hack of the Federal Deposit Insurance Corp. (FDIC) that went on for multiple years, starting back in 2010. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content —...
It’s been slow going when it comes to consumer adoption, but it seems digital identity companies are starting to bet big on mobile payment technology becoming more popular with consumers. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access...
Methbot, an ad fraud infrastructure that can host legitimate videos and serve them to 300 million fake viewers per day, has raked in around $180 million in the past few months, with each view earning the bad guys $13, according to Intel’s IT Peer Network....
Tricking someone into clicking on a fake website and turning over their personal data has been a favorite scam of hackers, and it doesn’t seem to be abating, with security firm Cyren reporting a fake Michael Kors shopping website coming in as the highest volume...
New research from Check Point shows that cybercriminals are increasingly targeting African countries with ransomware attacks. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional logins required. yesSubscribe to our daily...
Small, connected devices have quickly grown into a major security threat. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional logins required. yesSubscribe to our daily newsletter, PYMNTS Today. By completing...