Online outages affecting leading U.S. banking institutions continued Dec. 12, but only U.S. Bank confirmed its site issues were linked to a distributed-denial-of-service attack. Meanwhile, FS-ISAC outlined precautions institutions should take.
In this week's breach roundup, read about the latest incidents, including a California state health department breach involving Social Security numbers posted online and an e-mail hack affecting patients in the Carolinas.
As South Carolina officials figure out how to pay for a tax-system breach, lawmakers plan to introduce legislation as a result of the hack. Meanwhile, Gov. Nikki Haley, the face of the state's breach response, is seen unfavorably by a majority of surveyed residents.
A day after Izz ad-Din al-Qassam Cyber Fighters announced plans for a second wave of DDoS attacks, SunTrust, Bank of America and PNC experienced intermittent site issues, and U.S. Bank acknowledged the new threat.
Izz ad-Din al-Qassam Cyber Fighters has announced the "second phase" of its hacktivist campaign, saying five major U.S. banks will be the victims of new distributed-denial-of-service attacks starting this week.
Curbing pay-at-the-pump card skimming attacks is daunting, and incident tracking is to blame. But a new initiative spearheaded by the oil industry and card issuers raises the bar for information sharing.
Small attacks aimed at merchants are proving the most fruitful for hackers, recent analysis from Verizon shows. But risk expert Wade Baker says there are steps banking institutions can take to respond.