Even though the pass-the-hash (PtH) attack was originally published by Paul Ashton in 1997 and several white papers and tech briefs have been written on the topic, these attacks have recently come to the forefront again.
Read this white paper to:
Find out how these attacks work;
Learn about the mitigation...
Alleged Russian hacker Roman Valerevich Seleznev, arrested earlier this year, is facing 11 additional charges tied to the theft of credit card information for later sale on underground "carding" websites.
Malware known as "Mayhem" that targets Unix and Linux systems has been updated to exploit Shellshock flaws, security experts warn. But with few Unix-flavor systems running anti-virus software, how can it be stopped?
Kmart has confirmed a breach that started in early September involving a "new form" of malware that infected the company's payment card systems. Find out the details surrounding the incident.
Today's cyber defenses generate a cacophony of security alerts. Some might be useful. Most are not. And telling the difference isn't always easy.
With so many fish in the sea, it can be a challenge to find the meaningful ones. Join us for this webinar as FireEye Managed Defense analysts Nicole Oppenheim and...
Malware-wielding attackers have compromised 800,000 online banking credentials, mainly for customers of the five largest U.S. financial services firms, a new study warns. But they may also be preparing for APT attacks against financial institutions.
Citigroup, E*Trade, Regions Financial, Fidelity Investments, HSBC, Bank of the West and ADP are now believed to have been probed by the same hackers that targeted Chase, according to news reports. But so far, none of those firms believes data was compromised.
ATM skimming attack sophistication, and recent global upticks in ATM cash-out schemes, have put a spotlight on ATM-related fraud. Banking institutions, in particular, have struggled to keep up with some of these emerging ATM fraud schemes. One challenge banks and credit unions face is that their ATM networks are often...
Criminals have infected at least 50 ATMs in Eastern Europe, including Russia, with malware, dispensing millions of dollars in cash directly to money mules. Interpol warns such attacks could spread worldwide.
Nearly two weeks since news of Shellshock broke, attacks that are taking advantage of the Bash vulnerabilities are grabbing headlines. But Michael Smith of Akamai warns that the battle against hackers capitalizing on Shellshock could go on for years.
Twitter is suing the federal government, seeking to pave the way to publish its transparency report that documents the government's requests for user information.
The last five years have seen an explosion of technological innovation which brought many opportunities for business growth. Combined with the associated changes in socio-economic behaviours, the pace of change has also brought new risks and opportunities for criminals to become even more innovative.
Whilst providing...
This session provides a detailed review of BankInfoSecurity's "Faces of Fraud" survey focused on the European market. Receive insights and expert analysis on topics such as:
How are the areas of retail, payment card, in person, insider and mobile fraud evolving?
Which aspects of the new Canadian legislation are...
Session Preview:
Contact centers increasingly are the key "soft" targets for fraudsters who impersonate legitimate customers to alter or obtain information. This information is then used to facilitate direct and cross-channel fraud, which can be very difficult to tie back to the call-center entry point. How do...
See how the detailed analysis of millions of voice-based transactions has produced a "signal in the noise." From large-scale analysis, clear patterns emerge of how stolen payment card information is actually qualified, updated and adapted for monetization. This process is most often carried out by social engineering...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.