Citadel, one of the latest Zeus trojan variants, is a prime example of how hackers are pairing sophistication with practical conveniences. RSA's Etay Maor explains why that combination is so threatening.
To address the security and privacy challenges magnified by the velocity, volume and variety of big data, the Cloud Security Alliance has formed a big data working group. What are the group's objectives?
The Federal Bureau of Investigation denies that one of its agent's laptops was compromised by Anonymous-affiliated hacktivist group Antisec, which claims credit for such a breach. The group says the breach gave it access to 12 million Apple unique device identifier numbers.
Which employees are most apt to commit cyberfraud, and how can organizations detect and prevent their crimes? Researcher Randy Trzeciak shares insights and tips from a new insider threat study.
Smaller institutions could use some advice on security for mobile banking and cloud computing. But federal banking regulators apparently don't plan to issue technology-specific guidance.
The Democratic Party platform on cybersecurity suggests that President Obama will take unilateral action to safeguard the nation's critical IT infrastructure because of Congress' inability to enact comprehensive cybersecurity legislation.
U.S. Attorney Jenny Durkan's focus on cyberfraud has yielded impressive results. How are her federal prosecutions of cyberthieves setting examples for others to follow?
Cyberthieves are exploiting weaknesses in the U.S. payments infrastructure as an easy-to-travel avenue for access to intellectual capital, says risk consultant Bill Wansley. What can be done to stop them?
News of Google's $22.5 million settlement with the FTC has come and gone, yet privacy issues reflected in the case remain a concern. How should organizations react, and what steps should they take now?
Senate Select Committee on Intelligence Chairwoman Dianne Feinstein characterizes the steps President Obama could take alone to secure the nation's critical IT systems as limited, but meaningful.
U.S. banking institutions are making solid progress to conform to the FFIEC Authentication Guidance, says William Henley of the FDIC. So, how are examiners responding to banks' good-faith efforts?
As Tropical Storm Isaac strikes, many organizations still sting from the impact of Hurricane Irene and 2011's other natural disasters. What lessons were learned, and how can they be applied now?
Cyber is part of our everyday lives. Still, in many cases, a natural - or perhaps an unnatural - divide exists between the virtual and physical worlds. This is especially true in the way we deal with crime.
The only way to put a dent in financial fraud and cybercrime is through aggressive prosecution and tough sentences for the guilty. That's why a sentencing last week in the RBS WorldPay case is disappointing.
Labeling it "a very close call," a U.S. district court has rejected a Mississippi bank's bid to have a former customer held liable for losses, damages and legal costs in an ACH and wire fraud case.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.