Banking Trojans. Targeted attacks. Ransomware. These are among the latest manifestations of cybercrime. But who are the top cybercrime groups, and what security lessons can we derive from their latest attacks?
"This is definitely one of the most interesting years with regards to the criminal evolution," says Eward...
The threat landscape certainly has changed in recent years. But can you say the same about the traditional intrusion prevention system."The biggest problem with IPSs today is that organizations are trying to fight today's threats with yesterday's solutions," says Bertone, who serves as CTO of Fidelis Cybersecurity....
In this transcript of an audio interview about 2017 mobility trends, Tom Wills of Ontrack Advisory discusses:
The evolving mobile threatscape;
How enterprises are mitigating threats and leveraging mobility;
Developments to watch in the coming months.
Wills is an expert in digital trust - the field of...
Acknowledging the urgent IT security challenges the nation faces, a cybersecurity commission named by President Barack Obama encourages the incoming administration to adopt some of its recommendations in the first 100 days of Donald Trump's presidency.
Mirai, the ever-morphing malware behind devastating DDoS attacks, has also disrupted two U.K. broadband providers. The malware's framework is becoming a platform for attacks against IoT devices.
Law enforcement officials in the U.S., Europe and Asia say they've dismantled a resilient network used by cybercriminals to infect tens of millions of computers with malicious software.
Because so many major data breaches involve using compromised privileged credentials, organizations must ramp up their credential management efforts, says Gerrit Lansing of CyberArk.
Upgrading endpoint protection is an important step toward mitigating the risk of sophisticated ransomware and other malware attacks, says George Kaminski of Palo Alto Networks.
Britain has enacted a new mass surveillance law - the Investigatory Powers Act - which will allow the government to demand backdoors from tech companies to intercept communications. But at what cost?
You work hard to maintain your organization's reputation as a trusted financial advisor, and with good reason. Because many banks offer similar services and interest rates, one of your greatest differentiators, from your customers' perspective, is service.
Download this white paper to explore:
The need for an...
Synchronoss' Tracy Hulver on New Identity Strategies for Connected Healthcare Threats
Attackers have healthcare entities in their crosshairs, and their favorite targets are easily compromised credentials. Tracy Hulver of Synchronoss Technologies offers new ideas for how security leaders can reduce risk and protect...
Deutsche Telekom says 900,000 customers were unable to access the internet after their routers were infected with malware. Researchers say it's a modified version of Mirai - code for building an internet-of-things botnet.
Facebook says it hasn't seen ransomware spreading through its Messenger instant messaging platform despite recent reports from researchers saying that the file-encrypting Locky may have slipped through.
The latest ISMG Security Report leads with a look at the ransomware attack against San Francisco's light rail agency. Also featured is an analysis of the ongoing fallout from Australia's online census project.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.