At $1.5 million, it's one of the largest account takeover incidents on record. Attorneys review the Efficient Services Escrow case and ask who will be held responsible - the customer or the bank?
IBM announces plans to buy anti-fraud detection company Trusteer. Security technology formerly the province of financial services organizations is now hitting the broader enterprise market.
As cyber patent lawsuits become more common in regulated industries, organizations should take steps to protect their patents and fight infringement claims, says attorney James Denaro, who offers insight.
As organizations prepare to move critical workloads to the cloud, more stringent security and compliance requirements emerge. This report examines the strengths and shortcomings of existing cloud platform security technologies, and defines an approach to overcome these limitations and leverage existing technology to...
How Are Organizations Tackling Today's Top Mobile Security Challenges?
Organizations of all sizes are accommodating the bring-your-own-device trend before taking the time to consider this: How do we secure the systems and data accessed broadly by employees' mobile devices? The Beyond BYOD: Mobile Security...
Moscow-based cyber-intelligence firm Group-IB is working with INTERPOL to monitor and track online criminals. The purpose: to take down botnets throughout the world.
Microsoft touts new security features built into the Windows 8.1 Enterprise operating system. But are they enticing enough to win over organizations that are reluctant to upgrade from older OS versions?
It's been three weeks since the start of Phase 4 DDoS attacks on banks. But so far the impact has been minor. Are attacks over or yet to come? Rodney Joffe and other DDoS experts share theories.
In the wake of the NSA leak by former systems administrator Edward Snowden, how can organizations limit the amount of data access offered to those managing IT systems? Former CIA CISO Robert Bigman explains.
It's an increasingly common question from CEOs. "How is our security program protecting the business?" Pamela Gupta of OutSecure shares insight on what CISOs should demonstrate when they answer that question.
Because mobile payments are so new, banking institutions worldwide are still trying to understand which threats to address first, says payments fraud expert Neira Jones.
The malware attack that infiltrated Harbor Freight Tools' network could prove to be one of the biggest retail breaches this year, experts now say. Learn why card fraud linked to the attack is expected to grow.
DDoS attacks launched by hacktivists are often viewed as little more than an interruption to online services. But Terry Ray of Imperva highlights a greater worry hidden behind these attacks.
While user education is valuable, needed and helpful, there is one problem with this approach - it only partially works, and partially working is simply not good enough, security expert George Tubin contends.
Online account takeover occurs when an unauthorized party gains access to an existing bank account by stealing the access credentials and is followed almost invariably by the illegal movements of funds. In today's increasingly connected world, the growth in connectivity, convenience, speed, technology adoption, and...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.