Carl Pei, co-founder of OnePlus, a smartphone company, said Tuesday that his Twitter account had been compromised via a third-party app called IFTTT and a tweet had been injected via his profile for an apparent cryptocurrency scam.
The U.S. Department of Homeland Security is preparing cybersecurity regulations for the oil and gas industry in the wake of the ransomware attack on Colonial Pipeline Co. that resulted in the company suspending operations for several days, according to The Washington Post.
Iran is using its abundance of oil to generate electricity that powers a massive bitcoin cryptomining operation that enables the country to turn its greatest natural resource into money, offsetting some of its income lost as a result of economic sanctions, according to cryptocurrency analysis firm Elliptic.
To effectively battle against P2P payment fraud, it's essential that financial institutions make sure their fraud teams and AML teams closely collaborate, says John Buzzard, a fraud-fighting specialist at NICE Actimize.
Where were you on May 25, 2018? That was the day the EU's General Data Protection Regulation went into full effect. Three years later, some legal and privacy experts say that while the global privacy discussion and expectations have evolved, GDPR still has some growing up to do.
Experience as a chief enterprise architect offers excellent underpinnings for performing as a security leader, in that both roles require creating and executing a vision, backed by stakeholder buy-in and navigating obstacles - no matter the scarcity of resources, says Suren Naidoo, CISO of The Foschini Group.
"No risk, no business." As global CISO of Egyptian Arab Land Bank, Mohamed Mostafa says he regularly applies that maxim, which he learned from a prior boss, as he seeks to maximize his organization's security posture while working closely to collaborate with every line of business.
The U.K.-based insurance firm One Call says it has successfully restored its systems in a new environment that is separate from the one that was impacted by a ransomware attack May 13, adding that a ransomware note which purported to be from DarkSide could not be verified as authentic.
A year ago, Chris Pierson and BlackCloak studied executives at top global pharma companies to learn the extent of password-based vulnerabilities. The findings weren't reassuring. Pierson revisited the study this year with a select few entities to see if the needle has moved in a more secure direction.
The increasing number of cyberthreats, especially ransomware attacks, is leading some cyber insurers to raise premiums and limit some coverage in hard-hit sectors, such as healthcare and education, according to a report from the Government Accountability Office.
Insurance company CNA's apparent decision to pay attackers a $40 million ransom and Colonial Pipeline Co.'s payment of a $4.4 million ransom are stirring debate over whether such payments should be banned under federal law.
Drawing on her experience selling cybersecurity products and services, Nastassja Finnegan now sits in the hot seat, as CSO of South Africa's First National Bank. Succeeding in either role, she says, requires interfacing with users, understanding their needs and helping them to do the right thing.
Scammers are increasingly using Windows Push Notifications to impersonate legitimate alerts as a first step toward installing malicious Windows applications to harvest user and system information, according to a global report by McAfee.
As director of security for a telecom company, Ian Keller works to ensure customers have the latest knowledge and intelligence required to deploy the company's products in a secure and compliant manner.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.