Whether it’s consumers getting comfortable with a new payments experience or a large financial institution (FI) getting comfortable sharing data with FinTechs, there’s one constant that needs to be in place to make it all happen; trusted infrastructure. Those pipes — connecting old rails with...
T-Mobile confirmed that hackers stole sensitive data on more than 40 million customers, and is now offering McAfee identity protection services at no charge for two years, according to a Tuesday (Aug. 17) T-Mobile press release and media outlets. The mobile phone carrier said the...
Pearson, which is a London-based company working on educational publishing, has agreed to pay $1 million on charges that it misled investors about a 2018 cyber intrusion involving the thefts of millions of student records, according to a press release from the Securities and Exchange...
T-Mobile data may have been accessed illegally, the company announced in a Monday (Aug. 16) press release, noting it is “working around the clock” to investigate. “We take the protection of our customers very seriously, and we are conducting an extensive analysis alongside digital forensic...
T-Mobile is investigating claims that sensitive information from 100 million users is being sold on the dark web, Motherboard reported, citing contact with the seller and having seen data samples. The data includes information such as names and social security numbers; phone numbers and physical...
Cryptocurrency exchange Binance must identify hackers and freeze their accounts after one of the company’s users said it was the victim of a hack worth $2.6 million, under the terms of a High Court of London order, per Friday (August 13) reports. The court’s judgment...
Cryptocurrency platform Poly Network on Friday (Aug. 13) thanked the so-called “white hat” hacker or hackers who seemed to exploit a vulnerability in the company’s digital contracts and execute a $610 million hack by offering a $500,000 “bug bounty,” according to Reuters. Poly Network’s statement...
To get to a true digital-first economy, to have credentials in place that can be used across a variety of online activities and settings, online identity verification must be bound up with authentication. And that must be at the very start, Robert Prigge, CEO of...
Employees at various companies are increasingly taking sensitive computer code with them as they quit their jobs, the Financial Times (FT) reported. As pandemic restrictions ease, high numbers of people have been quitting their jobs, according to FT. Research from the cyber security group Code42...