From Global Payments to LinkedIn and Zappos, 2012 was filled with notable data breaches. What were the most significant breaches, and how should they influence organizations' breach responses in 2013?
The answer seems obvious, especially in the context of IT security and information risk. Yet, is it, especially when developing codes and standards, as well as funding research and development initiatives that involve taxpayer money?
In a new alert, the OCC says banking institutions should be concerned about fraud attempts linked to recent distributed-denial-of-service attacks on prominent U.S. banks.
Hacktivists' phase 2 DDoS attacks against U.S. banks appeared to subside Dec. 19, when only Wells Fargo reported limited online access issues. How does the latest incident compare to previous attacks?
Threats have evolved, and so have our Internet needs. This is why organizations need to explore the security and productivity gains of the next-generation firewall, says Patrick Sweeney of Dell SonicWALL.
Organizations must gather as much information as possible to make informed decisions in order to respond to IT incidents more effectively, says ENISA's Marnix Dekker.
PNC confirmed its online banking site was bombarded with high volumes of traffic for the second time this week. Meanwhile, banks worldwide are watching and preparing for similar DDoS attacks.
Online outages affecting leading U.S. banking institutions continued Dec. 12, but only U.S. Bank confirmed its site issues were linked to a distributed-denial-of-service attack. Meanwhile, FS-ISAC outlined precautions institutions should take.
A day after Izz ad-Din al-Qassam Cyber Fighters announced plans for a second wave of DDoS attacks, SunTrust, Bank of America and PNC experienced intermittent site issues, and U.S. Bank acknowledged the new threat.
Izz ad-Din al-Qassam Cyber Fighters has announced the "second phase" of its hacktivist campaign, saying five major U.S. banks will be the victims of new distributed-denial-of-service attacks starting this week.
Information sharing proved critical during the recent wave of DDoS attacks that hit leading U.S. banks. What lessons does the experience offer for organizations in other industries? Experts weigh in.
From point-of-sale hacks to malware and DDoS attacks, the top cyberthreats of 2012 have been aggressive and strong. Is it time for organizations to adopt a "hack back" strategy against perceived attackers?
The individual implementing security - the chief information officer - can't be the same as the person responsible for testing security, conducting audit and reporting on security weaknesses, South Carolina Inspector General Patrick Maley says.
Information sharing is key. The more we share about attacks - vulnerabilities and vectors - the more we will learn about how the attacks are waged, who's behind them and what they're after.
For the third time in a month, a source claiming to be part of the Izz ad-Din al-Qassam Cyber Fighters has granted an interview to discuss the distributed denial of service attacks on U.S. banks.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.