Buoyed by massive illicit profits, cybercriminals have continued to refine their ransomware attacks, including updating their crypto techniques to foil decryption tools, encrypting file names and threatening to leak stolen secrets.
The National Institute of Standards and Technology has issued a Guide to Application Whitelisting that provides step-by-step instructions on deploying automated application whitelisting to help prevent malware from accessing IT systems.
In a video interview, Bob Carr of Heartland Payment Systems offers a frank assessment of missteps in the wake of the processor's landmark 2008 data breach, and he calls for widespread use of end-to-end encryption.
To avoid having their organizations exploited by teenage hackers, boards of directors worldwide need to get serious about security. Here are five lessons to be learned from the latest TalkTalk data breach.
Under the White House's new cybersecurity strategy and implementation plan, federal civilian agencies face a Nov. 13 deadline to identify and report their high-value information and assets that could attract adversaries.
The FFIEC has issued an alert calling on financial institutions to take specific risk mitigation steps in light of an increase in the frequency and severity of cyberattacks involving extortion. Fraud experts applaud the move while offering additional recommendations.
The quantity and duration of distributed denial-of-service attacks continue to increase. The latest attacks are being launched via MySQL servers infected with Chikdos malware, as well as compromised Internet-connected CCTV systems, researchers say.
Tinba, which has been linked to attacks in the U.S., Canada and Europe, is now targeting bank accounts in Russia, according to a new report from Dell SecureWorks. Researcher Brett Stone-Gross tells why Tinba is unusual and can be tough to detect.
Developing a successful information security career requires excellent technical acumen as well as the ability to understand the impact that security policies have on people, says Gurdeep Kaur, a chief security architect at AIG.
A Nevada medical lab technician who had previously been convicted for Medicaid fraud has been indicted on charges of committing identity theft linked to credit card fraud while out on parole.
U.S. convenience stores and gas stations should be braced for a new uptick in pay-at-the-pump skimming attacks. A recent rash of attacks in Post Falls, Idaho, illustrates exactly why this form of fraud is becoming such a costly concern.
As more banks and government agencies stop providing free BlackBerries to employees, the beleaguered smartphone manufacturer is attempting to reboot with the launch of its first Android smartphone, dubbed Priv for privacy.
As U.S. financial institutions migrate to EMV, ACH and wire fraud is increasing, along with fraud tied to checking, says Mannie Da Silva of Fiserv. In a video interview, he discusses how banks can leverage new technologies, best practices and customer behavior data to stay a step ahead of fraudsters.
British police have arrested a third suspect in connection with the hack attack against telecommunications provider TalkTalk. Separately, Vodafone UK also issued an alert of a breach, which it traced to reused passwords.
Even though the U.S. is migrating to the EMV chip, Visa is still stressing the need for merchants to comply with the PCI Data Security Standard, says Eduardo Perez, the card brand's senior vice president of payment risk, in this video interview.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.