Mastercard introduces cards that work with fingerprints instead of PINs

Mastercard has added fingerprint sensors to its payment cards, in an attempt to make face-to-face payments more convenient and more secure.How does it work? “A cardholder enrolls their card by simply registering with their financial institution. Upon registration, their fingerprint is converted into an encrypted digital template that is stored on the card. The card…

Cyber risk issues resonating in boardrooms

The Cyentia Institute used in-depth surveys and interviews with corporate board members and CISOs to identify specific cyber risk issues resonating in boardrooms. CISOs report they spend most of their boardroom time “giving security guidance” on business enablement and loss avoidance. Surprisingly, CISO respondents reported they spend far less time discussing “data protection” and “brand…

38% of consumers affected by ransomware pay up

Consumers are increasingly being targeted with ransomware, and many of them are paying up, according to Trustlook. Since the beginning of 2016, ransomware has gone from a relatively exclusive category of malware utility to a mainstream destructive tool used in wave after wave of phishing attacks against individuals and companies alike. Ransomware is now so…

Fake LinkedIn emails phishing job seekers

The scammers are trying to impersonate the popular employment-oriented social networking service, but careful users will immediately spot many things that point to the email being fake: The email sender address that has nothing to do with LinkedIn The lack of certain design elements and the “unsubscribe” footer usually contained in LinkedIn emails The email…

Are travel Wi-Fi routers secure?

Last week at Kaspersky Lab’s Security Analyst Summit (the SAS), there was a lot of cool research that made you think. Although a lot of talks centered on deep APT research and threats to businesses, there were a few sessions where consumer security was shown to be at risk as well. One such talk was…

Cloud-based single sign-on means access and security everywhere

The cloud is now the standard of corporate organizational life. It is a standard practice for nearly every sector of every industry. So, there must be solutions available to help manage these cloud applications. To effectively manage your cloud applications – access security and permissions – is to employ automated account management technology for both…

Report: Cybercrime climate shifts dramatically in first quarter

The first quarter of 2017 brought with it some significant changes to the threat landscape and we aren’t talking about heavy ransomware distribution either. Threats which were previously believed to be serious contenders this year have nearly vanished entirely, while new threats and infection techniques have forced the security community to reconsider collection and analysis…