The FIDO Europe Working Group launched today with the aim of accelerating the use of FIDO authentication standards in Europe. SC Media UK spoke to Alain Martin, co-chair of the new FIDO Europe Working Group.
Weak cryptography in a standard developed by the IEEE could result in hackers bypassing encryption safeguards to steal intellectual property in plaintext, scientists discover.
Consumers are now able to authenticate themselves with their credit and debit card issuers when buying online by using web browsers or via mobile applications using the new EMV® 3DS standard, designed to cut online card fraud.
The CASE unified format for aggregating digital data from different forensic tools has been agreed at an event hosted by Europol's EC3 this week.
An analysis of over one billion lines of code finds the UK ranks last for the security of its code and finds that teams of 10 do better than teams of 20 or more.
The Inspector General has said that the U.S. Department of the Interior has to beef up its access controls if it wants to meet current standards
New standards and regulations to improve Russian bank responses to cyber-attacks - and help prevent insiders taking advantage of cyber-attacks to cover criminality.
The government must intervene to help improve cyber-security standards within the industry, according to GCHQ director Robert Hannigan.
Dejan Kosutic says ISO 27001 is applicable not only to IT firms, but also to financial organisations, government agencies, telecoms and health organisations.
Now starting its second year, Cyber Essentials certification is quickly becoming recognised as an invaluable kite mark and roadmap for organisations wishing to improve their cyber-security, says Chris Stanley.
Wave upon wave of data breaches are putting company IT security measures under the microscope worldwide, says Chris Sullivan.
The CBEST testing framework created by the Bank of England is a positive step but it could be stronger, says Clayton Locke.
A warning from a US government watchdog that hackers could potentially destroy an airplane via the on-board Wi-Fi has been questioned and criticised by information security professionals and pilots alike.
Suspicious activity now needs to be monitored in the entire processing chain, hence implementing PCI DSS 3.0 helps stop attacks before compromises occur says Ross Brewer.
Despite the recent iCloud breach, cloud security is better than its current image suggests - and if you are demanding of your supplier, it can be better still says Jamal Elmellas.
NIST cryptographers want to be able to reject NSA guidance.
If you have broken no law, nor failed to comply with any agreed industry standard, are you liable for the consequential loss incurred by your clients if you suffer a data breach that causes them loss?
Since its launch in 2009, Bitcoin has continued to dominate news headlines, for both good and bad reasons.
Europe's computer emergency response teams (CERTs) need to share attack informatio to combat the increasingly complex cyber attacks they face.
European Payment Services (EPS) in Berkshire has become the first vendor to have its point-to-point encryption (P2PE) hardware certified under global security standards used to protect consumer card data.