The only way to put a dent in financial fraud and cybercrime is through aggressive prosecution and tough sentences for the guilty. That's why a sentencing last week in the RBS WorldPay case is disappointing.
One takeaway from the $1-billion-plus verdict against Android-maker Samsung for infringing Apple patents is that the users of infringed technology also could be held legally liable, patent attorney Jim Denaro says.
E-mail, IM, text messaging - we all increasingly depend on messaging technologies. And so do the fraudsters. Craig Spiezle of the Online Trust Alliance discusses how to mitigate our vulnerabilities.
CSC's Sam Visner sees organizations, in growing numbers, thinking more intelligently about cloud computing, its security and architecture. Yet, he says, they're being very deliberate in their approach in adopting cloud computing.
RSA's Etay Maor says Citadel malware and ransomware attacks highlight a growing threat banking institutions and consumers must be prepared to fight. What can institutions do to mitigate risk?
Ron Ross, the NIST IT security and risk guru, sees cloud computing as a vehicle to help organizations implement an information risk management framework.
Targeted phishing attacks are at an all-time high, and one reason for the proliferation is a non-unified response from industry and government, says Peter Cassidy of the Anti-Phishing Working Group.
Visitors to the sites - applanet.net, appbucket.net and snappzmarket.com - will see a seizure banner that notifies them that the domain name has been seized by federal authorities.
More malware attacks fueled by Citadel and Reveton are getting attention from federal authorities, which say banking institutions and consumers should be on high alert. What can institutions do to mitigate emerging malware risks?
More than a year after issuance of the FFIEC Authentication Guidance, many smaller banking institutions still struggle to conform. How are service providers such as Q2ebanking stepping in to assist?
Secure is a possible state of affairs at a certain point in time. But rugged describes staying ahead of the threat over time. Rugged organizations create secure code as a byproduct of their culture.
Some U.S. federal agencies seem to be going too far in monitoring their employees' communications activities on their government-issued laptop computers.
Seven people have been accused by Michigan authorities of pulling off a unique account takeover scheme that targeted Bank of America and involved nearly $360,000 in fraudulent funds transfers.
Three years after the Heartland Payment Systems breach, Heartland and the PCI Security Standards Council are taking commendable steps to improve payments security at the merchant level.
A shift to context-aware information security will drive the big data trend and aid in better defending against threats. Gartner analyst Neil MacDonald explains how.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.