Cyber security news highlights — March 2,2016

Here are today’s news highlights. For more news on cyber security, visit our daily news page.

Turkish citizen charged with masterminding $55M ATM fraud pleads guilty

A Turkish citizen who led an operation that hacked into the systems of credit and debit card processing companies between 2011 and 2013 has pleaded guilty in a court in New York, according to officials….

FBI admits outcome of data battle with Apple will set legal precedent

The ongoing battle between the FBI and Apple over access to iPhone data of a terrorist, came before Congress on Tuesday. At the hearing the chief of…

The Volume of New Mobile Malware Tripled in 2015

The volume of malware targeting users of mobile devices grew more than three times in 2015, compared to 2014. The most dangerous threats in 2015 were ransomware, malware capable of obtaining unlimited rights on an infected device, and data stealers, including financial malware….

Point-of-sale vulnerabilities are not going away

Although its still early in 2016, already we are seeing reports of point-of-sale (PoS) breaches around the world. This trend is likely to continue as the year progresses, due to a number of contributing factors. 1. The pressure to adopt EMV* technology will continue to draw attention….

NSA Chief Worries About Cyber-Attack on US Infrastructure

“It’s only a matter of the when, not the if, you are going to see a nation state, a group or an actor engage in destructive behavior against critical infrastructure of the US.”…

The Best Free Antivirus Utilities for 2016

PC Security is your responsibility. If you neglect it, you could lose your money, your data, your creditworthiness, your good nameeven your freedom, if your PC is used for malicious purposes by hackers and you can’t prove it wasn’t you using it. Fortunately, you can do a lot to protect yourself…….

SANS Internet Storm Center: Cybercrime Recruiters Want You (InfoRiskToday)

The job listing continues: “You must speak English fluently: Bad grammar can be tolerated to a certain extent. You must be a knowledge seeker: You’re motivated and thrilled to learn new programming languages, attack vectors and everything else.” But based on his review of advertisements for hacking…