Categories
Security

How malware can sneak in through M&A

Companies that handle sensitive customer data have even more to worry about when making an acquisition. Not only do they have to be sure the acquired company has good security, but they can’t let their guard down even after the acquisition closes.
Read more on Payment Source. (Note: subscription wall.)

Categories
Security

How to trace stolen bitcoin? The answer may be a 200-year-old U.K. law

A Cambridge professor has found how an 1816 legal ruling can be used to trace stolen bitcoins, thus potentially making it easier for governments to legislate bitcoin exchanges.
Read more on Payment Source. (Note: subscription wall.)

Categories
Security

New malware freezes user's device in account takeover scheme

The one thing more valuable to consumers than their bank accounts might be their internet access โ€” and a new version of the โ€˜Trickbotโ€™ trojan targets both.
Read more on Payment Source. (Note: subscription wall.)