RSA says 30 U.S. banks are potential targets of a massive Trojan attack, and alleged hacktivists say three more institutions will be hit by DDoS attacks this week. How must banks respond to the latest threats?
Infosec pros take note: As the overall number of "true exploits" have decreased, targeted ones - especially those initiated by criminals or nation states - are becoming harder to detect, say IBM's Rick Miller.
In the wake of DDoS attacks aimed at five banks, and a fraud alert from FS-ISAC, U.S. banking institutions are taking several steps, including upping technology investments. What other actions are they taking?
Malware and cyberespionage tools like Gauss are hitting U.S. banking institutions and businesses from all corners of the globe. But why are these sometimes not-so-sophisticated attacks causing so much damage?
Banking institutions can expect more cyberattacks, including threats from nation-states, as the U.S. elections draw near. So they must take adequate security steps - and clearly explain them to their customers.
Financial institutions are now at high risk of cyberattack, according to the Financial Services Information Sharing and Analysis Center. What can institutions do to protect themselves from new threats?
Citadel, one of the latest Zeus trojan variants, is a prime example of how hackers are pairing sophistication with practical conveniences. RSA's Etay Maor explains why that combination is so threatening.
As users increasingly use mobile devices and operate outside the traditional corporate network, the concept of "endpoint security" has to evolve. And so do your strategies to secure the endpoint from sophisticated adversaries such as advanced persistent threat.
Register for this webinar to learn more about: