German jailed for Bluetooth-enabled PIN stealing kit
A 26 year-old German man has been sentenced to three years imprisonment for rigging retail card payment consoles to transmit captured card details and PINs over Bluetooth.
A 26 year-old German man has been sentenced to three years imprisonment for rigging retail card payment consoles to transmit captured card details and PINs over Bluetooth.
The Social Security Administration (SSA) puts thousands of Americans at risk of identity theft each year by accidentally leaking their Social Security Numbers, names and dates of birth, according to an <a href="http://projects.scrippsnews.com/magazine/grave-mistakes/">investigative report by the Scripps Howard New Service</a> .
Jaikumar Vijayan | 15 Oct | Read more
Prosecutors call it the biggest identity theft bust in US history. On Friday, 111 bank tellers, retail workers, waiters and alleged criminals were charged with running a credit-card-stealing organization that stole more than $US13 million in less than a year-and-a-half.
Robert McMillan | 08 Oct | Read more
Despite claims the phishing email that netted RSA’s staff in its SecurID breach was a crude example of social engineering, RSA boss Art Coviello insists it was highly sophisticated and would have fooled even the most skilled PC operator.
Biometrics — the security method for identifying an individual by making a match of fingerprints, iris, face, voice, DNA and other <a href="http://www.networkworld.com/news/2011/092811-biometrics-war-machine-251352.html">unique physical traits</a> — scares people, an industry leader in the field acknowledged this week. But enterprise technology managers say there's no doubt biometrics is a boon to enterprise security.
Ellen Messmer | 03 Oct | Read more
Within the IT security community, identity- and access-management (IAM) initiatives are considered high value, but are notoriously problematic to deploy. Yet despite IAM's complexity, it represents 30 percent or more of the total information security budget of most large institutions, according to IDC (a sister company to CSO's publisher).
Frank Villavicencio | 30 Sep | Read more
TAMPA -- Using a portable kit to be able to quickly analyze human DNA collected in the field for investigative and forensics purposes has been a long-time dream for the Federal Bureau of Investigation (FBI), law enforcement and the Department of Defense (DoD).
Ellen Messmer | 30 Sep | Read more
The complexity of encryption schemes has been increased dramatically in an attempt to outpace the development of computational tools designed to crack them. Now it's important to devise algorithms that can't be brute forced for trillions of years in the hopes that they will remain secure long enough to be useful before they, too, are broken. Here's a quiz about encryption to see how well you are versed in one of security's most important components. Keep track of your score and check at the end to see how well you stack up.
Tim Greene and Jim Duffy | 29 Sep | Read more
TAMPA -- Biometric security breakthroughs are coming that would let the military capture from a distance an iris and facial scan of an individual and immediately match it to a biometrics-based "Watch List" of suspected terrorists, combatants or criminals.
Ellen Messmer | 29 Sep | Read more
The Federal Trade Commission the week said it will hold a workshop that examines how burgeoning use of facial recognition technology impacts privacy and security.
Michael Cooney | 22 Sep | Read more
A child protection department under the UK’s peak serious crime fighting agency forgot to encrypt submissions made through its website.
Symantec Vision 2011 Sydney in pictures
Neerav Bhatt | 13 Sep | Read more
A 27 year-old bank cashier was fined £800 (A$1,226) yesterday for using her position at Barclays Bank to profile a customer who was the victim of a sex attack by the cashier’s husband.
GlobalSign expects to bring its certificate-issuing systems back online on Monday, and resume business Tuesday, it said over the weekend. The U.S. certificate authority (CA) stopped issuing new SSL certificates last Tuesday in order to audit its security, after being named as a target by the hacker who claimed to have attacked Dutch CA DigiNotar.
John Ribeiro | 12 Sep | Read more
The 10th anniversary of the infamous Sept. 11, 2001, terrorist attacks on America is prompting reflection on those who died on that day of mass murder, and <a href="http://www.networkworld.com/news/2011/090711-911-user-story-250602.html">what changed in our society</a> because of it.
Ellen Messmer | 10 Sep | Read more
Technology is a wonderful thing but while the majority of people will use it for proper and honest purposes, there will always be a small percentage who will use it for unethical reasons. And this is an important point to make – people use the technology for illegal or immoral purposes; the technology itself is not the issue.
Neil Gaughan | 05 Sep | Read more
A mish-mash of security issues came up this week, everything from how to protect virtualized environments to a system that protects copper in utility sites from robbery and a story about digital certificate thefts.
Ellen Messmer | 03 Sep | Read more
When you leave your flat, do you leave the door wide open with your jewelry and valuables on the coffee table? When you visit a popular coffee shop, do you leave your iPad and smartphone on the table and go off shopping for an hour or two?
Stefan Hammond | 30 Aug | Read more
The London Fire Brigade has deployed a new identity and access management (IAM) system to help protect its data systems and ease the workload on its helpdesk.
Antony Savvas | 27 Aug | Read more
Face-recognition technology and the near-universal adoption of social networking tools by teenagers could have already made future covert police and intelligence operations difficult, if not impossible, according former Australian Federal Police commissioner Mick Keelty.
Stilgherrian | 25 Aug | Read more