Listen to CUInfoSecurity’s latest podcast as a leading phishing researcher explains some of his newest findings on phishing. Dr. Markus Jakobsson is a professor at Indiana University, and a research fellow with the Anti Phishing Working Group (AWPG). Dr. Jakobsson is also Associate Director of the Center of...
Data breaches were hitting the headlines almost every week in 2006, with an estimated 100 million records compromised due to security breaches over the 100 million mark, according to the Privacy Rights Clearinghouse, which tracks breaches dating to the ChoicePoint incident in 2005. With all the press coverage and...
Wish List from Financial Institutions to Our Customers
As the weather outside gets colder and the year draws to an end, we're thinking of what would be some of the things we'd like to give and receive as gifts during the holidays. While your personal list may be longer than this, here's the 12 things we wish all of...
Cyber-criminals are targeting the most vulnerable access points within businesses - employees - to execute their attacks, a new study finds.
In its annual closely watched security report, IBM warns that although widespread virus outbreaks are on the decline, on the whole online attacks are expected to rise in 2006....
Nearly a quarter of PC users are targeted by monthly phishing attempts, according to a national study of online security.
Phishing is, of course, the practice of sending bogus but authentic-looking e-mails, purportedly from a trusted organization, to consumers in hopes of tricking them into revealing personal...
Internet-related crime,
like any other crime, should be reported to appropriate law enforcement investigative
authorities at the local, state, federal, or international levels, depending
on the scope of the crime. Citizens who are aware of federal crimes
should report them to local offices of...
How likely are you to be wooed into a false sense of security by a friendly face or the promise of a cash prize?A friendly, wholesome-looking team of surveyors recently set up shop in New York’s Central Park on behalf of RSA Security to find out how much personal information consumers would give up while...
In our ten years’ experience in detecting, locating, and prosecuting network intruders (hackers) we have seen that, as with many offline crimes, robust law enforcement alone cannot solve the network intruder problem. To be effective, any overall strategy must include the owners and operators of the...
Since January 1, at least 104 data incidents have been documented in the U.S., potentially affecting more than 56.2 million individuals. And that is probably just the tip of the iceberg.How many breaches don’t make the front page because the victimized company wants to avoid embarrassing publicity? We will...
Most Internet users know spam when they see it, but the vast majority are unfamiliar with terms like “podcasting,†“phishing,†and “RSS,†according to a recent study.The Pew Internet and American Life Project research, based on random telephone interviews with 1,336 Internet users,...
Hackers have changed their tactics and are exploiting flaws in popular software applications – including security programs — to break into the computers of consumers, government agencies, and businesses. What’s new about this, you might ask? The key word is “applications.†Until...
High-tech criminal gangs with access to sophisticated keylogging viruses pose a growing threat to financial institutions.Recently, England’s High Tech Crime Unit foiled an effort to steal over $100 million from a Japanese bank in London. The gang gained access to Sumitomo Corp.’s computer systems,...
We all know the threats posed by spyware to enterprise networks: user ID and password theft, financial loss, productivity drain, intellectual property theft. Security practitioners have two defenses at their disposal: the human and the technical. While the technology for combating spyware is improving, antivirus...
Internet-related crime, fraud, and damage is going through the roof. Here we take a look at what Consumer Reports has named the four major online threats you need to defend against.VIRUSES AND WORMSOldies but goodies (baddies?), these have plagued computer users for nearly two decades. They typically infect computers...
TO: Chief Executive Officers and Chief Information Technology Officers of National Financial Institutions, Federal Branches, Service Providers, Department and Division Heads, and Examining PersonnelPURPOSEThis alert is intended to raise awareness of an increasingly common Internet fraud called “phishingâ€...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.