The Latest News

  • What is Gov't Role in Info Sharing?

    Researcher Says Private Sector Input Will Hinge on Trust What is Gov't Role in Info Sharing?
    Lance James

    This year could mark a turning point for the sharing of threat intelligence, but only if the government is able to build a framework that instills private-sector trust, says threat researcher Lance James. Read more...

  • Hackers Steal Trading Algorithms

    Attacks Aimed at Hedge Funds, Trading Firms Hackers Steal Trading Algorithms

    Hackers have been stealing the secret trading algorithms that are the lifeblood of many hedge funds and high-frequency trading firms, according to two security companies. What can be done to mitigate the risks? Read more...

  • Police Disrupt Banking Malware Botnet

    But Worldwide Impact of Ramnit Takedown May Prove Temporary Police Disrupt Banking Malware Botnet

    Authorities have disrupted a botnet that was serving up the Ramnit banking malware, which has infected 3 million PCs worldwide. But information security experts warn that the disruption will likely be temporary. Read more...

  • How Faster Payments Could Reduce Fraud

    NACHA CEO Outlines Plan for Stronger Security through ACH How Faster Payments Could Reduce Fraud
    Jan Estep and Joe Proto

    NACHA is already laying the groundwork that will help make the Federal Reserve's faster payment plan a reality while ensuring security and reducing fraud, says Jan Estep, NACHA's president and CEO, in an exclusive interview. Read more...

  • Understanding the Hacker Mindset

    Learning About Motives, Tactics Key to Mitigating Risks Understanding the Hacker Mindset
    Bank of the West's David Pollino

    Learning more about potential attackers and their preferred information targets is one of the best ways organizations can mitigate their cyber-attack risks, says Bank of the West's David Pollino, a featured speaker at ISMG's Fraud Summit LA. Read more...

  • Article

    Questioning Gemalto's Reaction to Hack

    Company's One-Week Investigation Downplays the Impact By Mathew J. Schwartz
    Questioning Gemalto's Reaction to Hack

    SIM card manufacturer Gemalto says its investigation into a reported U.S. and U.K. intelligence agency espionage operation found that its internal networks housing encryption keys weren't breached. But security experts question those findings.

  • Article

    FCC Adopts 'Net Neutrality' Rule

    New Rule Extends Privacy Protections to Customers By Eric Chabrow
    FCC Adopts 'Net Neutrality' Rule

    The FCC's new "net neutrality rule," which prevents ISPs from slowing down content streaming along their networks and from charging extra fees to assure faster speed, includes provisions designed to protect the confidential information of customers.

  • Article

    Lenovo Website Hijacked

    Lizard Squad Takes Credit, Says It Has Stolen E-Mails By Mathew J. Schwartz
    Lenovo Website Hijacked

    The hacking group Lizard Squad has claimed credit for hijacking the website of Lenovo.com and redirecting visitors to an attacker-controlled site. It also indicates that it's now sitting on a cache of stolen Lenovo e-mail messages.

  • Article

    Compromise on Info-Sharing Bill Grows

    GOP Committee Chairman Says He Sees Merit in Obama Plan By Eric Chabrow
    Compromise on Info-Sharing Bill Grows

    A willingness to compromise expressed at a House hearing on President Obama's cyberthreat information sharing initiative offered a sign of hope that legislation to get businesses to share such data could pass Congress and be signed into law.

  • Article

    Target Breach Costs: $162 Million

    Response Expenses Continue to Grow Following 2013 Incident By Jeffrey Roman
    Target Breach Costs: $162 Million

    Target's breach-related expenses not covered by insurance have totaled $162 million so far, its latest financial report shows. And experts say the breach could continue to have a financial impact for years to come.

More news...

Webinars

More webinars...

White Papers

  • M-TrendsĀ® 2015: A View From the Front Lines

    Talking about the threat landscape is no substitute for experiencing it first-hand. "M-Trends 2015: A View from the Front Lines," distills the insights gleaned from hundreds of Mandiant incident...

  • 2015 Security Predictions: Another Bumpy Year Ahead

    It was a tough year for CISOs in 2014, and a great year for cybercriminals, as billions of dollars of global economic productivity were siphoned into their hands. It's easy to see that thieves are...

More whitepapers...
ARTICLE Industry News: Juniper Updates Platform

Leading this week's industry news roundup, Juniper Networks announces advancements in its threat...

Latest Tweets and Mentions

ARTICLE Industry News: Juniper Updates Platform

Leading this week's industry news roundup, Juniper Networks announces advancements in its threat...

The ISMG Network