Financial services company Morgan Stanley has fired an employee who it claims stole account data for hundreds of thousands of clients and posted a small subset of it online. Find out how many clients were affected.
New York Attorney General Eric Schneiderman announces that five individuals have been arrested and charged for their alleged role in a New York-area ID theft ring that targeted customers of local banks and resulted in $850,000 in fraud losses.
What steps can organizations take to mitigate insider fraud threats? Michael Theis of Carnegie Mellon, a featured speaker at ISMG's upcoming Fraud Summits in Toronto and London, explains why using data analytics is key.
News about the existence of a new government leaker exposing national security documents shows that - even one year after Edward Snowden - organizations still don't have a handle on the insider threat.
Researcher Joxean Koret says he's cataloged local and remote vulnerabilities in 14 antivirus applications, many of which have since been patched. But shouldn't the vendors have spotted them first?
U.S. officials have confirmed the existence of a new leaker exposing national security documents, CNN reports. The leak apparently involves documents prepared by the National Counterterrorism Center.
A multi-layered approach known as "context-aware security" is the most effective strategy for fighting both insider and external cyberthreats, says Gartner analyst Avivah Litan, who explains how this strategy works.
Using technology to devalue card data, and leveraging data analytics, are essential to efforts to crack down on fraud, Visa's Ellen Richey said in her keynote presentation at the San Francisco Fraud Summit.
The recent Verizon Data Breach Investigation Report notes more than 16,000 incidents in the past year where sensitive information was unintentionally exposed. "Nearly every incident involves some element of human error," the report notes.
There's a ton of event content to choose from at Infosecurity Europe 2014, which runs from April 29 through May 1, and here are some of the sessions that caught one editor's eye.
Eight defendants have been charged in an alleged identity theft fraud scheme involving the theft of personal information from a call center for use in unauthorized wire transfers and to obtain payment cards.
Fraudsters are increasingly turning to prepaid cards to move money and perpetrate fraud, says payments fraud expert Tom Wills. Today, prepaid cards are the new money mules, he says.
When a former U.S. president acknowledges that he won't use e-mail to correspond with foreign leaders to avoid snooping by the NSA, you know the image of America as a bastion of freedom - at least online - has dropped a few more notches.
Security experts are sizing up the challenges that would be involved in implementing a federal government proposal to continuously monitor employees and contractors with security clearances in hopes of preventing leaks of sensitive information.
The investigation of the disappearance of Malaysian Flight 370 is raising issues that are very similar to those considered in cybersecurity cases, ranging from the insider threat to deleting data from a computer.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.