The past year has brought new meaning to the term 'hack.' Pervasive malware and advanced threats have reached unprecedented levels, with some estimates as high as 500 million financial records impacted in 2014. In this white paper, we look beyond the headlines and focus on the root causes of the high profile target...
Global eCommerce sales are predicted to reach $1.5 trillion in 2014 and are further predicted to grow by a meteoric 57% by 2017, according to eMarketer. A downside of this explosive growth is the increased opportunity for online fraud.
Building smarter rules around fraud detection and automating the process is proven...
Going by the number of headlines about data breaches, it appears the bad guys always seem to be one step ahead, skillfully customizing
malware and social engineering to get past our best defenses and evade detection. The problem is when it comes to advanced attacks, security teams can't see the forest of trees - too...
Spear phishing is a primary means by which APTs target and infiltrate networks. This e-book explores the various elements of these types of attacks, such as:
The characteristics of phishing emails;
How spear phishing and APTs are related;
How to protect against them and keep your organization safe from advanced...
Every day there is a story in the news, about another business that has fallen prey to cybercriminals. Are you confident your business is protected against these attacks? Join this webinar to learn how you can best protect your business, and avoid becoming next weeks news.
In this informative webinar, you will...
When it comes to mobility, enterprises are not nearly as secure as their security leaders believe them to be. In a global survey of 400 information security executives, 44 percent rate themselves at above average or superior when self-assessing their organizations' mobility security. Yet, 41 percent suffered a...
Learning more about potential attackers and their preferred information targets is one of the best ways organizations can mitigate their cyber-attack risks, says Bank of the West's David Pollino, a featured speaker at ISMG's Fraud Summit LA.
Big Fish, a Seattle-based online game producer and distributor, is notifying an undisclosed number of customers that their payment card information may have been compromised following a malware intrusion.
Some security experts contend that users of numerous types of Lenovo PCs and laptops are at risk of having their encrypted traffic get intercepted because of installed-by-default Superfish adware, which handles digital certificates insecurely.
Attacks are larger, adversaries more diverse, and damage is broader. These are characteristics of today's DDoS attacks, and organizations need a new approach to protection, says Verisign's Ramakant Pandrangi.
In less than three years, the DMARC standard has reshaped the email fraud landscape, disrupted longstanding phishing strategies, and forced cybercriminals to abandon preferred targets. Today, DMARC is still the best remedy in the fight against phishing and spoofing. As its implementation continues to spread outward...
Extradited Russian national Vladimir Drinkman, who's been charged with masterminding the largest-ever hack attack in U.S. history, this week pleaded not guilty in U.S. federal court to 11 charges relating to the theft of 160 million payment cards.
Email fraud has existed since the advent of email. But the schemes are evolving and impacting organizations' bottom lines. Robert Holmes of Return Path offers new strategies to defeat fraud attempts.
Target is the high-profile example, but many organizations have been breached through third-party vulnerabilities. Where are the security gaps, and how can they be filled? BitSight's Stephen Boyer offers insight.
Despite commitments by leading payment card brands to enhance security, some critics say the White House cybersecurity summit produced no specifics for how the public and private sectors will curb cyber-fraud.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.