As various batches of stolen credit card "dumps" are offered for sale with discount structures and money-back guarantees, it is clear just how sophisticated the Fraud Ecosystem has become. The fraudsters and their support teams have created well-organized forums offering a broad variety of products that constitute a...
The adoption of so-called "bring your own device" (BYOD) programs has raised new tensions between IT departments and workers over employer access to personally owned mobile devices. BYOD programs have opened the gates to a range of consumer devices in the workplace, raising concerns over data security and nonstandard...
Businesses targeted by ransomware attacks are increasingly willing to negotiate with - and even pay - their extortionists. But negotiating with cyberthieves is never a good idea.
The FFIEC warns U.S. financial institutions that they're at increased risk from attacks that are designed to harvest large amounts of credentials, as well as from destructive "wiper" malware attacks.
Community banking institutions are at great risk of cyber-attack because they often don't think they're targeted, says Scott McGillivray of Pacific Continental Bank, who describes how to convey this risk to senior management.
More hackers are holding data for ransom, demanding everything from bitcoins to the shutdown of nuclear reactors, under the threat of leaking sensitive information. But it's not clear how many such attacks generate revenue for attackers.
Ransomware attacks are getting more agile, varied and widespread, and are increasingly taking aim at businesses of all sizes in all sectors, rather than consumers. That's why employee education is so critical.
Today's cyber world is an evolving landscape of known vulnerabilities and exploits coupled with new threats brought by new technologies. Security professionals must learn to protect their businesses from both.
The HP Cyber Risk Report 2015 brings the information you need to do that. This comprehensive study...
As a result of the explosive growth in worldwide use of smart phones, mobile malware will play a much bigger role in fraud this year, predicts Daniel Cohen, a threat researcher for RSA, which just released its 2014 Cybercrime Roundup report.
For the third time in recent weeks, in-the-wild attacks are exploiting a newly discovered zero-day vulnerability in
Adobe's Flash plug-in for Web browsers, Trend Micro reports.
The FBI has issued an alert about a "Business E-mail Compromise" fraud scam targeting businesses that regularly make wire transfers to foreign companies. Experts offer mitigation insights.
Adobe confirms that a zero-day flaw exists in its Flash browser plug-in and promises to soon release Windows, Mac and Linux fixes for affected versions of Flash Player. The vulnerability is reportedly already being targeted by in-the-wild attacks.
The relative anonymity afforded by using the cryptocurrency known as Bitcoin appears to be in jeopardy, making it potentially less attractive for use in connection with cybercrime.
As various batches of stolen credit card "dumps" are offered for sale with discount structures and money-back guarantees, it is clear just how sophisticated the Fraud Ecosystem has become. The fraudsters and their support teams have created well-organized forums offering a broad variety of products that constitute a...
Intelligence is critical in mounting an effective defense and, equally as important, is an effective offense. This session will look at intelligence gathering from both sides of the DMZ. There is a great deal of critical information available about your adversaries and a startling amount about you, your organization,...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.