Two of the hacker masterminds behind the notorious SpyEye malware have each received lengthy prison sentences after pleading guilty to related charges in U.S. federal court. But alleged Zeus creator and accomplice Evginy Bogachev remains at large.
Epic Systems' successful lawsuit against India's Tata Consultancy Services raises many security questions. For example, why did Epic find out about the allegedly inappropriate downloading of trade secrets from an external whistleblower, rather than as a result of internal detection efforts?
An effective way for attackers to appear legitimate in face of security solutions is by exploiting logic
flaws in the functionality of existing systems. These logic flaws are what we
call design vulnerabilities.
With design vulnerabilities, the threat actor exploits a feature of a given product. It's not that...
What could be worse than a ransomware infection? How about getting infected by "torture ransomware" that uses a sadistic puppet to taunt you, slowly deleting your encrypted files while increasing the ransom demand until you pay?
Today's cyber actors are becoming more sophisticated, agile and capable of getting past any network security. Organizations must evolve, replacing traditional defensive security strategies with a proactive, intelligence-driven offense to prevent and disrupt these threats.
Download this white paper to explore:...
i2 Enterprise Insight Analysis helps the analyst see the forest through the trees. Analysts' using i2 EIA will discover that these events are all related. All the anomalies are connected to DHCP servers initially infected by malware. The new specialty of cyber threat analysis, also referred to as cyber analysis, is...
Cyberattacks are a clear and present threat to government agencies. Full and detailed data analysis is one of the only emerging ways to get ahead of these threats. According to industry experts, cyber threat analysis currently relies on automated as well as human input.
Download this whitepaper to explore:
...
With the right combination of multi-dimensional analysis capabilities and advanced analytics, you can turn your defensive cyber strategy into a proactive one - and counter and mitigate more threats.
Download this infographic to explore:
How many cyber attacks an organization faces in one week;
How much...
Data protection laws in Europe are more important than ever before individuals are becoming more and more sensitive about privacy, data protection breaches are daily headline news, and the regulatory regime is getting tougher.
Download this white paper to explore
Where this new law applies;
What the new...
Malware presents a persistent threat to organizations of all sizes. Yet organizations can't stop malicious attacks if they can't see them.
Download this white paper to explore
Why organizations succumb to malware attacks;
Why increasing visibility of network activity can help organizations improve their...
Does a federal appellate court's decision allowing a breach-related class-action lawsuit against restaurant chain P.F Chang's to move forward - and a similar, earlier decision in a case against Neiman Marcus - signal a change in tide for post-breach lawsuits? Legal experts offer widely varying opinions.
Only 23 percent of surveyed organizations can respond effectively to a cybersecurity incident. This is among the findings of Solutionary's fourth annual Global Threat Intelligence Report. Researcher Rob Kraus discusses the security gaps.
A recent spate of spam emails has been tricking users into installing JavaScript-based downloaders, which then download and install Locky and TeslaCrypt ransomware, Microsoft warns. Security experts detail top defenses.
Yes, security leaders need greater visibility into their systems and the internal/external threats. But they also need to improve how they share information from this view, says Gautam Aggarwal of Bay Dynamics.
In a video interview at RSA Conference 2016, Aggarwal discusses:
The visibility most organizations...
As millennials come to represent more than 50 percent of the population, that dynamic changes global payments - and fraud. David Sylvester of Easy Solutions discusses new strategies to help protect users from their own behavior.
In a video interview at RSA Conference 2016, Sylvester talks about:
How millennials...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.