Incidents such as the WikiLeaks disclosures and resulting fallout push leaders to redefine their data protection agenda for 2011 and think about their organizations' vulnerabilities.
A security firm finds that mobile apps often store sensitive financial data, highlighting the industry's need to implement stronger encryption and authentication measures for mobile banking apps.
Mini-documentary takes you inside the U.S. Cyber Challenge security treasure hunt, where competitors hack deep into a target information system to capture flags in a contest that combines skills and wit.
When it comes to banking malware, there are two threats: The actual software that is growing in sophistication and stealth, and then the level of awareness among banking employees and customers alike.
Organized crime was responsible for 85 percent of all stolen data in 2009. And stolen credentials were the most common way to gain unauthorized access into organizations.
How vulnerable are organizations to cyber attack? It depends on your definition of "vulnerable," says Robert Richardson, Director of the Computer Security Institute (CSI). "There's vulnerable," he says, "and then there's likely to be attacked."
In an interview about current threats, Richardson...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.