Since at least 2016, hacked websites have targeted zero-day flaws in current versions of Apple iOS to surreptitiously implant data-stealing and location-tracking malware, says Google's Project Zero team. Apple patched the latest vulnerabilities in February.
Fortinet's FortiGuard Labs global threat research team is creating research playbooks that provide deep-dive analysis of not only threat trends, but also cybercriminal and adversary tools and techniques. Derek Manky and Tony Giandomenico discuss the playbook model and how it can help in the fight against cybercrime.
In-App Protection Crucial for High-Value Applications
How do you prevent applications from becoming a security failure? According to Gartner, by deploying in-app protection capabilities that include hardening techniques, application monitoring, anti-tampering, and threat analytics.
In the 2019 Market Guide for...
George Orwell's "1984" posited a world in which Big Brother monitored us constantly via "telescreens." But thanks to our "smart" AI home assistants - from Google, Amazon and others - we're increasingly installing the monitoring equipment ourselves, and it may "hear" much more than we realize.
Together with President Donald Trump and the EU Copyright Directive, the U.K's Internet Services Providers' Association has nominated Mozilla as one of its three nominees for "internet villain" of the year. Its purported crime has been to advance a more secure version of the domain name system.
Enterprise Security teams are looking for proven ways to increase the visibility of their security programs while also optimizing technology investments. A large number of organizations have implemented Endpoint Detection and Response (EDR) solutions and many others are considering it. While these solutions are best...
In this solution approach guide, we'll discuss how using an IBM i2® solution to investigate fraud and financial crimes can help an organization achieve an asymmetrical advantage by removing the fraudsters greatest weapon, their ability to remain concealed. IBM i2's industry-leading, multidimensional intelligence...
Protecting an enterprise environment can sometimes feel like an uphill battle. Information security teams are often stuck in cyclical patterns where it feels as if the alerts never end and the attackers are constantly successful.
Unfortunately, this pattern is a symptom of organizations that live in reactive mode....
Unlike popular TV crime shows, discovering clues for complex crime rings takes a lot more time than an hour. Investigative analysis is a detailed tradecraft where the clues to advancing investigations and solving crimes often span numerous sources of information in multiple locations.
As a result, law-enforcement...
The 2018 cybersecurity landscape ushered in a blend of old and new threats, some of them game-changing, according to Trend Micro's Annual Security Roundup.
Download this exclusive eBook on the threat landscape and learn about:
The growth of messaging threats;
The evolution of ransomware;
Why 2019 may be the...
With cyberattacks, online espionage and data breaches happening at a seemingly nonstop pace, Western intelligence agencies are bringing many of their capabilities out of the shadows to help businesses and individuals better safeguard themselves and respond. We need all the help we can get.
The 2018 cybersecurity landscape ushered in a blend of old and new threats, some of them game-changing, according to Trend Micro's Annual Security Roundup. Trend's Greg Young shares insight from this report.
A common complaint among threat intelligence analysts is the near impossibility of searching global
threat intelligence feeds to find the specific threat and vulnerability information that matters to their
organization.
The underlying problem here is the lack of visibility across all internal files and objects....
Given the unsustainability of the status quo, it's a question worth considering.
Technology constantly advances. Businesses now leverage the cloud, mobility, AI, IoT, and blockchain
in ways that were once unthinkable. So no one can credibly claim that the same technologies they used
to empower their business a few...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.