Click on a filter below to refine your search. Remove filter to broaden your search.
|Last 12 months||remove|
Hint: If you don't want the words you enter to be searched for separately, use quotation marks to find people or exact phrases. See our Search Help section for more hints.
Small skimmers fit inside card readers rather than resting on top of them and coupled with mini cameras yield card and PIN data.
The group allegedly embedded Bluetooth-enabled skimming devices on gas pumps, which allowed them to siphon credit and ATM numbers, as well as PIN numbers, of individuals who paid at the pump.
Researchers with the University of Cambridge revealed just how effective PIN Skimmers can be against mobile devices in a recently released study on the new type of side-channel attack.
In this video, Stefan Tanase, senior security researcher at Kaspersky Lab, sits with Danielle Walker, reporter at SC Magazine, to discuss the threat of financial fraud today.
Visa is urging card issuers to adopt chip cards instead of cards relying on magnetic stripes after a slew of retail stores' data breaches, including Target and Neiman Marcus.
A U.S. District Court judge meted out punishment to co-conspirators who installed skimming devices on Chase ATMs in Connecticut and New Jersey.
Next year, EMV migration in the U.S. will inevitability change fraudsters' attack methods.
The two Romanian nationals installed the skimmer at a Brooklyn Chase branch and were arrested after two hours.
The lastest card skimming scheme affected at least 13 states and the District of Columbia and possibly began almost half a year ago.
Security researchers discovered that a piece of malware, known as Ploutus, has been infecting ATM machines in Mexico.
IT pros tend not to spend much time pondering whether physical access to a computer system is locked down.
Fraudsters boldly entered the store to plant skimming devices.
High-end retailer Neiman Marcus is now added to the list of major retailers confirming credit card breaches.
Experts discuss the most dangerous new attack techniques, which include point-of-sale malware, mobile and wireless threats, and compromise of industrial control systems.