Even the brightest technologists aren't immune from cyber-attacks. Just ask Facebook. The social-media company says it fell victim to a sophisticated attack in which an exploit allowed malware to be installed on employees' laptops.
The Citadel banking Trojan is now a threat to multiple sectors. And new research suggests improved monitoring is essential for the protection of critical systems and intellectual property.
The hacktivist group Izz ad-Din al-Qassam Cyber Fighters warns that DDoS attacks against U.S. banks could resume soon. What tips do security experts offer for DDoS detection and response?
In this week's breach roundup, read about the latest incidents, including an ID theft case at a Florida health department, and a security technology vendor hit by a breach.
Some of the largest banks in the U.S. were unable to ward off sophisticated DDoS attacks, so what can smaller organizations do? Plenty, says Marty Meyer, President of Corero Network Security.
How could 18 people pull off an alleged international bank fraud scheme involving 25,000 fake cards and $200 million in losses? One expert tells how banks can bridge the gaps that hide such scams.
Criminals, hacktivists and hostile governments understand that the quickest way to corporate data is through mobile workers' unsecured endpoints.
Cyber criminals targeted mobile devices at unprecedented rates in 2012, exploiting the weakest link in the corporate network to steal enterprise information. For the first...
For the fourth consecutive year, Information Security Media Group will be a Platinum Media Sponsor of the RSA Conference. And for the fifth straight year, ISMG editors will host staged sessions at the event.
What are the two newest malware strains discovered by researchers at Trusteer and Kaspersky? And how do these exploits challenge the way banking institutions currently detect and prevent online fraud?
A full 60% of organizations haven't done the basics.
Read this ESG Brief, Advanced Malware Protection Must Extend to Incident Detection and Response, and discover:
How your organization's incident response steps stack up
Why 'stop the bleeding' approaches are inadequate
A 5-step process to enhance your...
Outsourcing to the cloud poses new risks, especially for card data. The PCI Council addresses those risks in its just-released cloud security guidance, and Bob Russo offers exclusive insights.
The compromise of hundreds of payment cards, apparently tied to fraud worldwide, has been linked to a network hack affecting an Arizona supermarket chain. And the attack involved a new kind of malware, the chain says.
Although hacktivists announced suspension of DDoS attacks against banks, other industries are now getting hit, and banks can't afford to get complacent because of the fraud risk, says security specialist Bill Stewart.
Visa recently warned card issuers to be on the lookout for an upswing in ATM cash-out schemes. But what can be done to thwart this type of fraud? A Visa executive provides specific tips.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.