Both Microsoft and Apple this week released patches to address the so-called "Freak" flaw in SSL/TLS. Microsoft also released a fix that addresses a failed 2010 patch for a vulnerability that was exploited by the Stuxnet malware.
A former customer service representative at Blue Cross Blue Shield of Michigan is among 11 individuals recently arrested in connection with an alleged identity theft scheme that resulted in hundreds of thousands of dollars in credit fraud.
A banking regulator's comments about the need for retailers to bear responsibility for card breaches are outdated. Merchants aren't to blame for our broken payments system. Rather than point fingers, regulators need to offer stronger leadership.
West Virginia United Health System is taking a multi-step approach to thwarting insider threats, including aggressive analysis of access audits, says assistant CIO Mark Combs, who helps lead the system's privacy and security efforts.
The latest annual Office of Management and Budget report to Congress on agencies' FISMA compliance shows IT security is complex and tough to effectively implement, with authentication, in particular, a challenge.
The use of smartphones, tablets, and other mobile devices to sign up for new accounts or conduct other banking transactions has grown rapidly in the financial services market. Today over fifty percent of common banking transactions are completed using mobile apps. Unfortunately, crime associated with their use has...
With the introduction of sophisticated threats such as advanced phishing and malware, authentication can become less effective. Authentication methods can be bypassed by fraudsters and traditional risk-based authentication solutions can cause many users to be unnecessarily challenged and disrupted, yet do not manage...
Mobile banking continues to gain momentum, growing faster than any other delivery channel to date. Many financial institutions want to expand capabilities in the mobile channel, but are concerned about security. Given the evolving threats, mobile innovation has outpaced the industry's appetite for deploying new...
Cybercriminals are stepping up their attacks on financial institutions by gaining control of customer devices with highly advanced man-in-the-browser (MitB) malware and spear phishing attacks. They then conduct real-time credential theft and take over accounts. The main reason for cybercriminals' continued success is...
The malware industry supplies all the components cybercriminals need to easily perpetrate malware-driven financial fraud and data theft. In today's virtual world, the
scope of organizations vulnerable to malware-driven cybercrime is quite broad. In addition to banks and credit unions that are subject to online...
With the rise of mobile usage and increased mobile banking functionality, cybercriminals are targeting the mobile channel with advanced malware, cross channel attacks across online and mobile and social engineering that have typically been seen on the PC.
Read this white paper to learn more about the emerging...
Cybercriminals rely upon increasingly sophisticated techniques to steal the credentials of online banking customers, and then reuse them to take over the victim's account and perform fraudulent transactions such as transferring money to new destinations. IBM Security Trusteer solutions offer multiple layers of...
The primary approaches used to fight advanced threats over the past several years simply aren't effective. Traditional methods such as user education, vulnerability patching, and malware detection have failed to protect enterprises against the current threat landscape. Attackers continuously develop sophisticated...
Cyber attacks are growing every day and become serious threats to your organization, but how do you know and understand the threats out there?
Download a copy of this book, and you will:
Discover the zero-day exploits and threats used to compromise your enterprise;
Learn about a promising new technology...
Corporate credentials. They're the keys to your enterprise and more than likely you've taken many steps to protect them. However, what many CISOs and security managers are finding is that traditional approaches to preventing credentials theft from implementing stringent identity management policies to deploying...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.