Mobile devices can be an insecure and unsafe environment. Gartner estimates a majority of apps have programming errors that can be easily exploited by hackers. So how can apps be secured to let users operate safely on malware infected devices without compromising their data and transactions?
The protection needs to...
Mobile applications are fraught with their own unique security challenges and threats that can put both organizations and their users in jeopardy. The challenges of balancing user demands for simplicity with an increasingly complex mobile ecosystem means developers have to adapt fast.
Download this guide and learn...
As ransomware attackers continue to hone their craft, defense also is evolving. Con Mallon of CrowdStrike discusses what to do - and what not to do - when your organization is struck by ransomware.
Organizations are scrambling to identify security weaknesses before their adversaries do. Having a consistent, systematic, and scalable methodology to properly assess your environment is essential. To begin you need a solid understanding of the organization, its components, what it relies on, and what could cause it...
Many organizations are undergoing a transformation to support digital platforms and stay competitive; but in order to maintain security, they have to ensure that access to these platforms is limited and that security remains a priority. New vulnerabilities to cybercrime are being introduced through hybrid...
As data continues to grow and become increasingly regulated, organizations will need an enterprise-wide security strategy that's holistic, covering users as well as data, while also improving their compliance posture. It's easy to think of the mainframe as just another platform in the data center, until you stop and...
Another day, another data breach in the news. Ransomware at a hospital, the latest IRS breach, a phishing scam at Snapchat . . . you tune out the details. For every breach that makes headlines, dozens of other organizations have had data stolen or corrupted by hackers...or even their own users. Cyberthreats become...
Businesses around the world are seeing an increase in malware attacks, including ransomware like CryptoLocker, Locky, and zCrypt. These attacks can result in weeks of downtime, and some of the most damaging data breaches originated with malware, including the Target breach in 2014.
A robust malware defense could...
Hybrid cloud security is a hot topic, especially with the massive growth of public cloud providers like Amazon Web Services (AWS), Microsoft® Azure�� and Google Cloud. With the emergence of the hybrid cloud, where workloads are deployed across physical, virtual, and cloud, security professionals are constantly being...
Warning: Drop everything and patch all the Windows things now. That's the alert being sounded by security researchers in the wake of attackers adopting Equation Group attack tools designed to exploit an SMB flaw and install DoublePulsar backdoor.
It used to be that cybercriminals would blindly cast a wide net, sending millions of fraudulent emails in the hope that a few people would be tricked into handing over their personal or financial information. Today, targeted attacks are the weapon of choice: a far more lucrative tactic that uses malware purpose-built...
Hybrid clouds represent the new normal for data centers, which, in turn, warrants a new security model that needs to be grounded in an understanding about what is different about cloud infrastructure. IT and security professionals are well aware of the need to retool for this new normal.
Given strong adoption of...
Leading the latest version of the ISMG Security Report: A tale of how a dedicated manager spent her weekends monitoring video of ATMs led to the capture of a criminal skimmer. Also, the growing sophistication of cybercriminals.
In 2016, there were two contenders for king of ransomware: Locky and Cerber. So far in 2017, we've seen a massive shift in the battle between these two families, with Locky basically dropping out entirely and Cerber expanding its market share by a significant amount. New families such as Spora are emerging as well,...
The recent fix for a zero-day flaw in Microsoft Office appeared more than five months after Microsoft was privately alerted to the flaw, and followed months of it being exploited via in-the-wild attacks. Can Microsoft do better?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.