An attempted intrusion is still being investigated, but Texas-based Sally Beauty has no evidence to suggest that 282,000 payment cards found in an online underground crime market were pilfered from the worldwide retailer.
On the same day that an attacker stole 896 bitcoins from Bitcoin bank Flexcoin, an individual allegedly posted the Mt. Gox code on Pastebin.
We've all been breached, but there are steps we can take to evolve the system, says security strategist Dan Srebnick.
From October 2012 to February 2013, Lauri Love allegedly worked with other hackers to steal and publicly distribute personal information housed on the Federal Reserve network.
Mt. Gox announced on Friday that it has filed for bankruptcy protection in Japan after hackers took advantage of weaknesses in its computer systems to purloin hundreds of thousands of bitcoins.
YouTube's ad network was compromised to host the Styx exploit kit, researchers found.
The malware is based on the leaked code of Zeus and RAM-scraping malware.
Officials are investigating an 11-minute video posted on YouTube that shows new information attackers may have obtained after hacking websites and internal systems belonging to Las Vegas Sands Corp.
The associations will explore options for improved information sharing and implementation of card security technology.
An undisclosed number of individuals who applied online for a position with Bank of the West may have had personal information compromised after an unauthorized party gained access to a job application system that contained the data.
CERT Polska researchers have observed attackers using DNS redirection attacks - made possible due to vulnerabilities in home routers - to effectively access online banking accounts in Poland.
The San Francisco Airport - South San Francisco Embassy Suites hotel is notifying an undisclosed number of guests that their payment card information may be at risk after skimming devices were discovered on two computers.
At least 4,500 payment cards have been compromised in the United States and Canada by a new point-of-sale malware, JackPOS, that is based on Alina, according to researchers with cyber intelligence company IntelCrawler.
Researchers with cyber intelligence company IntelCrawler have discovered a new point-of-sale malware known as JackPOS, which is said to have code similar to the RAM-scraping POS malware known as Alina.
Target announced last week that hackers compromised its systems using credentials stolen from a third party vendor and, on Thursday, Fazio Mechanical confirmed that it was the victim of an attack.
Executives with Target and Neiman Marcus were among the individuals who testified before the Senate Judiciary Committee on Tuesday.
The Bank of England has released the results of Waking Shark II, a Nov. 12, 2013, four-hour simulated cyber attack in London involving hundreds of financial institutions that was designed to test the city's cyber security readiness.
The Gameover variant of the nefarious Zeus banking trojan has recently been observed sneaking past defenses as an encrypted EXE file, according to researchers with Malcovery.
White Lodging Services Corporation is investigating a suspected breach of its point-of-sale systems, the Indiana-based hotel management company announced on Monday.
The benefits of cryptocurrency for consumers are well known, but there are also some downsides that must be addressed.
A worldwide point-of-sale malware operation involving a relatively new trojan - called ChewBacca - has impacted dozens of retailers in the U.S., according to RSA researchers.
Stolen vendor credentials is what led to a massive malware attack on Target's point-of-sale machines, ultimately resulting in the theft of 40 million payment cards, among other information.
Apple CEO Tim Cook addressed using the Touch ID to expand the mobile payments market on Monday, a move that could allow consumers to make a wider variety of purchases by simply scanning a fingertip.
After Target and Neiman Marcus, Michaels Stores is the next in a line of U.S. retailers to reveal that it is investigating a possible security breach that may have resulted in the compromise of customer payment cards.
IntelCrawler concluded on Sunday that 23-year-old Rinat Shibaev - not 17-year-old Sergey Taraspov, as the company previously reported - is the writer of the malware that infected Target's point-of-sale systems.
At the border of U.S. and Mexico, two individuals were arrested in connection with the late-2013 Target breach.
The attack on Neiman Marcus point-of-sale systems dates back to July 2013 and the threat was not completely mitigated until Sunday, unnamed people briefed on the retailer's investigation told the New York Times.
The operation that likely led to the infection of Target's point-of-sale systems is known as KAPTOXA, according to a release by iSIGHT Partners.
Researchers with cyber intelligence company IntelCrawler have identified a new point-of-sale (POS) malware, known as 'Decebal,' available for purchase on underground forums.
Malware found on the payment systems of Neiman Marcus led to the compromise of card data for an undisclosed number of shoppers, but PIN data is not at risk because the retailer does not use PIN pads in its stores.