Anonymous says its OpUSA attack planned for May 7 aims to 'wipe' government and banking websites from the Internet. Security experts say the threat is real, but are U.S. organizations taking it seriously?
Although there have not yet been any confirmed reports of financial fraud associated with a major data breach at the Utah Department of Health last year, the potential for costly fraud is huge, contends Al Pascual of Javelin Strategy and Research.
Obtaining timely, accurate updates about emerging cyberthreats is challenging. The FS-ISAC is now offering briefings on the latest trends and how to address them, says Bill Nelson, president.
Hacktivists' phase 3 DDoS attacks against U.S. financial services firms have entered their eighth week, and FS-ISAC spokesman Greg Garcia says concerns are mounting that a criminal element to the attacks could emerge.
Cybercriminals are stepping up their attacks on financial institutions by gaining control of customer devices with highly advanced man-in-the-browser (MitB) malware and spear-phishing attacks. They then conduct real-time credential theft and take over accounts. The main reason for cybercriminals' continued success is...
U.S. banking institutions are reluctant to acknowledge - much less discuss - ongoing DDoS attacks. But in recent regulatory statements, the nation's largest banks are candid about DDoS and its impact.
Call center fraud is becoming a bigger problem for banks and credit unions, and one new scheme identified by a community bank in Georgia illustrates how scams are getting more difficult to detect.
History shows that DDoS phase 3 may end soon, and banking institutions can expect an even more powerful 4th wave. "There is little reason for the attacks to cease," says Javelin's Al Pascual.
Every enterprise has high-value information that is vital to its success. As cyber-attack techniques become more sophisticated your "digital gold" is increasingly vulnerable. Today's cyber threats have changed in sophistication, in focus, and in their potential impact on your business.
Download this eBook to...
Hacktivists have formally launched their third wave of distributed-denial-of-service attacks on U.S. banking institutions, and their botnet is growing. How should institutions prepare to defend?
From sophisticated malware to socially-engineered schemes, banking institutions of all sizes are under constant, multi-channel attack. How can they respond? Daniel Ingevaldson of Easy Solutions shares ideas.
The PATCO fraud case shows why banking institutions cannot rely on compliance to ensure security. In an RSA 2013 preview, attorney Joseph Burton discusses legal lessons from the PATCO settlement.
The National Credit Union Administration is the second federal regulator to issue a warning about fraud risks linked to DDoS. One legal expert says banking institutions must heed the warning.
From sophisticated malware to socially-engineered schemes, banking institutions of all sizes are under constant, multi-channel attack. How can they respond? Daniel Ingevaldson of Easy Solutions shares ideas.
The Citadel banking Trojan is now a threat to multiple sectors. And new research suggests improved monitoring is essential for the protection of critical systems and intellectual property.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.