The arrest of 10 individuals allegedly tied to a global phishing scheme that exploited Facebook is good news. But experts say banking institutions need to push stronger security and authentication to protect accounts.
Hacktivists announced Dec. 18 that they planned yet another round of distributed-denial-of-service attacks against five U.S. banks. Wells Fargo confirmed its online banking site experienced outages throughout the day.
Eurograbber got banks' attention after compromising out-of-band authentication in Europe. But researchers say it's the knowledge of the hackers behind the attack, not the Trojan, that's most concerning.
The National Institute of Standards and Technology has published new guidance on generating cryptographic keys to help organizations protect their data with secure keys no matter the type of algorithm they choose.
Online outages affecting leading U.S. banking institutions continued Dec. 12, but only U.S. Bank confirmed its site issues were linked to a distributed-denial-of-service attack. Meanwhile, FS-ISAC outlined precautions institutions should take.
As South Carolina officials figure out how to pay for a tax-system breach, lawmakers plan to introduce legislation as a result of the hack. Meanwhile, Gov. Nikki Haley, the face of the state's breach response, is seen unfavorably by a majority of surveyed residents.
A day after Izz ad-Din al-Qassam Cyber Fighters announced plans for a second wave of DDoS attacks, SunTrust, Bank of America and PNC experienced intermittent site issues, and U.S. Bank acknowledged the new threat.
Izz ad-Din al-Qassam Cyber Fighters has announced the "second phase" of its hacktivist campaign, saying five major U.S. banks will be the victims of new distributed-denial-of-service attacks starting this week.