Although it's important to work with law enforcement after a data breach, organizations need to be careful about what information they share, says attorney Ruth Promislow, partner at Bennett Jones LLP.
Phishing attacks are on the rise for two main reasons, according to Brooke Satti Charles, a Financial Crime Prevention Strategist with IBM Trusteer. The first is how easy they are to launch. The second is their continued profitability for attackers.
So how can enterprises make sure they are not the next...
Travel industry giant Sabre said Wednesday an intruder using stolen account credentials for its widely used reservations software had access to payment card details and personal information over a seven-month period. But it declined to say how many people are affected.
As the global threat landscape shifts, so does Kaspersky Lab. Whereas Kaspersky Lab traditionally has been known for its cutting-edge research on threat trends and malware evolution, now the focus is expanding to encompass the new types and vectors of fraud impacting enterprises, says Emma Mohan-Satta, a Fraud...
Police in Ukraine have seized servers operated by the Intellect Service, which develops the M.E. Doc accounting software used by 80 percent of Ukrainian businesses. Attackers backdoored the software to launch XData, NotPetya and fake WannaCry - aka FakeCry - malware campaigns.
The recent proposed settlement of a class action lawsuit against health insurer Anthem following a 2015 cyberattack impacting about 79 million individuals is significant for several reasons, says attorney Steven Teppler of the Abbott Law Group, who analyzes the deal.
Phishing attacks are on the rise, due in large part to how easy to launch and lucrative they are for the attackers, says Brooke Satti Charles of IBM Trusteer.
"Phishing is a really easy way to perpetrate an attack," says Satti Charles, a financial crime prevention strategist. "Creating a sophisticated way to break...
Ransomware attacks are increasingly using multiple proven techniques to spread quickly and achieve the maximum impact before being thwarted. They are going to get bigger and target other platforms in the future, warns Justin Peters at Sophos APAC.
By lowering the price of Windows, could Microsoft help stop the spread of mass ransomware worms? India seems to think so. But fresher versions of Windows won't be a cure-all.
Despite significant efforts by the payment industry to systematically address ATM security, vulnerabilities associated with these devices continue making them attractive targets of opportunity for criminals.
Download this whitepaper and learn how a balanced approach to ATM security can address incorrect...
Usability doesn't have to come at the expense of a more secure app, and security doesn't require making an app more complex to use. The net result is that cyber-criminals and other attackers can be neutralized with the right choices that are both usable and secure.
To make your mobile banking app easier and safer...
Consumers want to use mobile for everything from banking to shopping to gaming. However, mobile is notoriously flawed when it comes to security measures. As you bring your services into the mobile ecosystem, there's great potential for expanding your business, but also great potential for threats - to your...
Automation speeds up the delivery of applications by automating the delivery of the resources they require, including networking, security, and the infrastructure that supports application development.
Download this whitepaper and learn how automating IT can solve challenges such as the lack of standardization and...
Sixty-five percent of security leaders consider their organizations' security postures to be above average or superior, as compared to peers in their sectors.
Yet, only 29 percent say that they are very confident in the effectiveness of their security controls, and nearly half say that they have gaps in detecting...
If you're thinking, "Mobile threats and malware are still in their infancy and the risk isn't significant enough yet," it's time to think again. The rise of advanced, PC-grade mobile malware, innovative fraud schemes, such as SIM swap fraud, and fraudsters' increasing use of mobile devices in cross-channel attacks...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.