At a first-principles level, math forms the foundation of the entire payments ecosystem. There are encryption methods that rely on advanced mathematics to secure sensitive payment data; tokenization that replaces sensitive data, like card numbers, with a nonsensitive equivalent called a token; cryptocurrencies like bitcoin...
The year of the cyberattack is apparently not going to end quietly. For example, a report Friday (Dec. 13) by Ars Technica deals with a yearlong attack that has been stealing login credentials from both “malicious and benevolent” security personnel by infecting them with Trojanized...
President-elect Donald Trump is reportedly looking for ways to get tougher on cyberattackers. That’s according to U.S. Rep. Mike Waltz, R-Fla., Trump’s choice to serve as national security adviser. Speaking to CBS’ “Face the Nation” on Sunday (Dec. 15), Waltz said the government needed to...
Rhode Island’s public benefits system has reportedly been targeted in a ransomware attack. Hackers breached the online system and have threatened to disclose users’ personal information unless they get a payment, Bloomberg News reported Saturday (Dec. 14). This data could be exposed “as early as...
The cornerstones of modern businesses are under attack. With the news Monday (Dec. 9) that cybercriminals, alleged to be from the ransomware group Termite, are exploiting a security flaw that affects Cleo’s LexiCom, VLTransfer and Harmony enterprise file transfer tools, securing critical business infrastructure that...
The Department of the Treasury’s Office of Foreign Assets Control (OFAC) has sanctioned a China-based cybersecurity company and one of its employees, saying they played a role in an April 2020 compromise of about 81,000 firewalls owned by thousands of businesses worldwide. The sanctioned parties...
Technology begets opportunity, for both successful companies and fraudsters. And today’s rising tide of cybercrime has unveiled a new frontier of fraud, one where malicious entities and cybercriminals are focused on exploiting the building blocks of digital identity—domain names, hosting services and financial supply chains....
Chinese hacking group Salt Typhoon reportedly has stolen the call record metadata of a “large number” of Americans. The metadata was taken in a broad and ongoing attack on America’s telecommunications infrastructure, Reuters reported Wednesday (Dec. 4), citing an unnamed senior U.S. official. Speaking during...
SentinelOne’s artificial intelligence (AI)-powered Purple security suite has doubled its market reach, now protecting twice as many devices compared to last quarter. The company announced Wednesday (Dec. 4) that Purple AI has become its fastest-growing product as it bolsters its AI capabilities against emerging cyberthreats....