The U.S. and China may have signed a Memorandum of Understanding last week to establish an agreement on trade and information security, but the National Security Agency director warned such an accord will not deter cyber espionage activities, CIO Online reported yesterday (Sept. 28). Get...
When it comes to cybersecurity, many organizations think that “Bigger is better” is a saying to live by. However, Phantom Cyber thinks a lighter touch can be more effective. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to...
It takes a village. Consumers may have one digital identity, but creating one that can be authenticated securely and that is also scalable means that a lot of players have to get on the same page around a common set of standards. Philip Andreae, VP,...
A new survey shows cybersecurity experts are questioning how secure mobile payments really are. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional logins required. yesSubscribe to our daily newsletter, PYMNTS...
It’s becoming harder and harder to find retailers that haven’t been the target of a large-scale cyber attack, and a common refrain in those stories is that the hackers used sophisticated and complex ways to get around digital security checkpoints. However, hackers often don’t have...
It appears a number of Hilton Hotels properties have been part of a payments breach, Krebs on Security reported, citing multiple banking sources. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional...
PayPal woke up to a nightmare when it received an unsolicited offer by the infamous TRC Capital Corporation (TRC) to buy up to 3 million shares of its common stock at a reduced price. Get the Full Story Complete the form to unlock this article...
Some of the largest U.S. tech companies are feeling the backlash for their vote of support for the proposed, and very controversial, Cybersecurity Information Sharing Act (CISA). Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all...
It was once an urban legend of the digital world that Apple products simply couldn’t be hacked. Dozens of years and several iPhones later, it’s clear that Apple doesn’t get any special protections from malware. Get the Full Story Complete the form to unlock this...