Heartland Payment Systems hacker Albert Gonzalez seeks to overturn his conviction and 20-year sentence, a record for a computer breach, maintaining he committed his crimes with the knowledge of his Secret Service handlers.
Federal and state banking regulators closed two banks and one credit union on Friday, April 8. These failures raise the total number of failed institutions to 34 so far in 2011.
The Epsilon e-mail breach has opened the door for what experts fear could be 'massive spear phishing attacks.' Here are 7 security tips to help organizations protect themselves and their customers.
NCUA Chairwoman Debbie Matz urges credit unions to maintain a state of readiness and to work prudently and flexibly to address financial needs of federal workers and other individuals affected by the impasse on federal spending.
Experts say banks and retailers are doing all they can to control concerns in the aftermath of the Epsilon e-mail breach, and a well-crafted e-mail fooled an RSA employee into opening a phish that led to a sophisticated attack on the company's information systems.
Most furloughed federal employees would have had to turn in their BlackBerries and other mobile devices in a U.S. government shutdown. Just as well, using the technology could have resulted in an employee landing in the slammer.
Defining essential federal information systems to keep operating during a partial government shutdown could prove more complex than defining essential federal workers not to furlough.
At a time when there is heightened demand for cybersecurity professionals within the U.S. federal government, the value of IT security certifications ranks high as a criterion for hire.
Philip Reitinger, the top cybersecurity official in the Department of Homeland Security, is on a mission to help create a new, secure computing ecosystem on the Internet.
When it comes to e-marketing and the reliance on third parties such as Epsilon, Nicolas Christin of Carnegie Mellon University says banks and merchants should "come clean" about the information they share with outside entities.
The advanced persistent threat attack against RSA has raised the visibility of multifactor authentication technology to potential users. And, in the long run, that might help RSA's bottom line.
Communicating with customers about the incident and warning them not to click links in phishing e-mails are all these impacted institutions and companies really can do, says Jeremiah Grossman, chief technology officer of WhiteHat Security.
Privacy Attorney Lisa Sotto says the Epsilon e-mail breach is a warning about the state of data security employed by some third-party service providers. Strong contracts related to security practices must be the norm, not the exception.
"Persistent" is the operative word about the advanced persistent threat that has struck RSA and its SecurID products. "If the bad guys out there want to get to someone ... they can," says David Navetta of the Information Law Group.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.