Leading U.S. banks remain quiet about the DDoS attacks they've suffered. But their SEC reports shed new light on what's going on. Learn what Wells Fargo and Chase recently revealed.
Providers of technologies employees acquire through unconventional channels that could bypass their employers' supply-chain controls are known as "shadow suppliers." Here's why you should care about them.
As a result of a major breach of the state's tax system, South Carolina is considering creating a federated model of IT security governance. The plan would create a central organization to determine policies, with individual agencies implementing them.
In the aftermath of an international $45 million cyberheist and ATM cash-out scheme, experts say pinpointing the source of such a massive breach can be difficult. Why?
How Organizations Can Respond Faster to Today's New Breed of Cyber-Attacks
Under the shadow of advanced security threats, only 20% of organizations rate their incident response programs as "very effective." Their biggest gaps: Being able to detect and contain malware, which can also be the precursor to advanced...
Malware attacks against retailers are becoming more common. Many breaches linked to these attacks could be prevented, experts say, if merchants took more steps to lock down networks and point-of-sale devices.
Why are ATM cash-out schemes expected to increase - especially in the U.S.? John Buzzard of FICO's Card Alert Service offers insights, based on federal investigators' most recent global fraud bust.
CERT Technical Manager Dawn Cappelli tells a tale of how three individuals, who unexpectedly quit their jobs at a law firm, used a free cloud service to sabotage files containing proprietary client information from their former employer.
Last year, Neustar reported on the DDoS landscape. Earlier this year, Neustar surveyed IT pros on their experiences in 2012. Did the threat of DDoS grow or shrink? What were the costs of downtime? In total, were companies better prepared to protect their websites and their brands?
DDoS attacks continue to grow in...
A key difference between state-sponsored espionage and organized criminals or hacktivists is the level of persistence and determination to break through defenses. Here's advice from security experts on defending against nation-state attacks.
The biggest lesson banking institutions can learn from this week's reported $45 million global cyberheist: Old attacks always return. Learn why thwarting these coordinated fraud schemes is challenging.
Cash-out scams are old news. But the size and sophistication of the latest $45 million global fraud scheme that struck banks add up to a troubling trend, says former federal prosecutor Kim Peretti.
Payment data and personal information are both attractive targets for criminals, says breach investigator Erin Nealy Cox of forensics firm Stroz Friedberg. Learn why she says card data isn't the only lucrative target.
In light of evolving fraud threats, financial institutions increasingly are turning to two-factor authentication solutions. Alex Doll, CEO of OneID, offers advice to help institutions make the right choices.
Eric Bangerter, an executive with a $1.6 billion institution in Wisconsin, explains why the risks associated with mobile apps led his team to opt for using a Web-based platform for mobile banking instead.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.