Spear phishing, or targeted phishing, schemes are the industry's most concerning trend, according to a new report from the APWG. So, what can we do to curb phishing attacks? Executives at BITS and FS-ISAC have a new idea.
Security and privacy officers for global organizations can expect increased work in protecting customer data if a proposed regulation introduced before the European Commission becomes law, cyber and privacy lawyer Francoise Gilbert says.
Bringing Your Own Device raises jitters among employers, who worry about exposing or losing sensitive data, and employees, who fret about their bosses spying on them. Despite these anxieties, the trend will continue because that's what people want.
Does the U.S. government's shuttering of the file-sharing website Megaupload.com show that new laws are not needed to battle intellectual property piracy? Brookings's Allan Friedman believes it does.
Recently discovered viruses, consisting of Trojans and other malware, at City College of San Francisco have stolen personal banking information and other data from perhaps tens of thousands of students, faculty and administrators, says John Rizzo, president of the board of trustees.
A legal dispute between a small merchant in Utah and its former payments processor has fueled a debate over contracts between merchants and acquirers. If successful, this case could spur contractual shifts that change the way card brands view liability after card breaches.
A group of Saudi Arabian hackers, identified as "Nightmare," conducted distributed denial-of-service attacks Jan. 16 against the Tel Aviv Stock Exchange and El Al, Israel's national carrier.
Cyberhackers are increasing their efforts to target online credentials. And phishing attacks waged against accountholders at Chase in the U.S. and Barclays in the U.K. have made it clear that banking accounts are the target.
The insider poses one of the greatest and most damaging security risks any organization faces. So why do so many businesses and institutions fail when it comes to addressing this most obvious security risk?
A breach is a disaster, says business continuity specialist Ken Schroeder. So organizing an effective breach-response team does not require a reinvention of the wheel. What it does require is a holistic approach.
Wells Fargo & Co. may have committed an inadvertent data breach when it responded to subpoenas requesting financial information about some of its customers. What happened, and who is impacted?
As U.S. banking institutions work to conform with the FFIEC Authentication Guidance, are they now doing better jobs of detecting and preventing incidents of ACH and wire fraud?
Outrageous Facebook behavior by a contractor at a California hospital offers an eye-opening reminder about the need for a zero-tolerance policy when it comes to privacy violations.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.