Just recently we witnessed the U.S. House of Representative pass two bills aimed at bolstering the security operations of the nation's critical infrastructure.
Retail organizations have long been the target of financially-motivated crime. According to Verizon, 92% of the retail breaches they've studied were committed by external actors.
The PCI Security Standards Council's new general manager Stephen Orfei spoke at the Florida community meeting.
Home Depot confirmed that approximately 56 million payment cards may have been compromised as result of a malware attack.
Due to the flaw, iPhone bidders were vulnerable to being redirected to a phishing page.
Nuix believes the malware found on Home Depot's systems belongs to a different threat family.
On Wednesday, PCI SSC updated its card skimming prevention guidance for the first time in five years.
The same malware that reportedly struck Target also hit Home Depot's POS systems, a new report from Brian Krebs reveals.
The warning comes soon after the Secret Service and DHS issues a warning on the threat.
Starting July 2015, all smartphones sold in the state must come with the anti-theft technology.
The Secret Service said that over 1,000 U.S. businesses have been infected with the malware.
The guidance is meant to help merchants and third parties better understand their roles and responsibilities in the payment security ecosystem.
The PCI Security Standards Council General Manager Bob Russo will retire at year's end; Stephen W. Orfei will take the helm in September.
While P.F. Chang's investigates a breach, it has shifted to manual payment card imprinting, suggesting that point-of-sale devices may have been compromised.
A former Home Depot employee was fired and is being prosecuted for accessing customer account information and distributing card data.
It is still unclear whether the lawsuits will gain class-action status, putting potential claimants in the millions.
On Monday, Target CEO and Chairman Gregg Steinhafel announced that he was stepping down from his position.
A new study weighs the collateral damage from data breaches hitting businesses.
The bill would ban businesses from storing sensitive payment data, for any long than required, even if it is encrypted.
An investigation dating back to January has finally confirmed that malware on point-of-sale systems may have compromised payment card data for millions of Michaels Stores and Aaron Brothers customers.
The group being implicated has stolen over 160 million card numbers over the years by hacking organizations, including Heartland Payment Systems, Visa and 7-Eleven.
Banks impacted by the Target data breach have banded together to file a class-action against the retail giant, as well as against security firm Trustwave.
After claiming it saw no evidence that payment card data was taken in a breach, the chain now says fewer than 25,000 records were "illegally accessed."
Prior to its massive breach, Target seems not to have responded to multiple alerts from security company FireEye involving suspicious activity on the retailer's network.
An attempted intrusion is still being investigated, but Texas-based Sally Beauty has no evidence to suggest that 282,000 payment cards found in an online underground crime market were pilfered from the worldwide retailer.
In the aftermath of the Target breach, there is a huge need for all the people who are engaging with technology to understand more about cyber threats and ways they can account for these before and after something goes down.
The malware is based on the leaked code of Zeus and RAM-scraping malware.
The associations will explore options for improved information sharing and implementation of card security technology.
Target announced last week that hackers compromised its systems using credentials stolen from a third party vendor and, on Thursday, Fazio Mechanical confirmed that it was the victim of an attack.
Executives with Target and Neiman Marcus were among the individuals who testified before the Senate Judiciary Committee on Tuesday.