The Zeus Trojan is frightening because of its agility, evolution and success at stealing banking credentials. How can institutions fight back? Malware expert Andreas Baumhof offers new ideas.
A data scientist is a new breed of database professional who applies scientific analysis to large data sets to identify patterns and vulnerabilities. Here are five expert tips on how to qualify for the new role.
Organizations using semantics and big data tools are creating a new position called data scientist to help uncover fraud and identify undetected vulnerabilities. Here are profiles of three leaders who have embraced this role.
LinkedIn has confirmed that a breach of its network compromised hashed passwords associated with accounts. Security experts speculate that e-mail addresses also could be vulnerable.
Many organizations aren't devoting enough resources to ensure that applications for mobile devices are secure, says security expert Jeff Williams. He offers five tips for adequately addressing mobile application security.
The statistics revealed in the ACFE's new 2012 Report on Occupational Fraud and Abuse are all very real. Here are my insights on occupational fraud and steps leaders can take to detect these crimes.
A U.S. appellate court decision in a case involving a jail term for a HIPAA violator offers an important reminder of the potential consequences for accessing patient records without a valid reason.
The social network Myspace has settled with the Federal Trade Commission over misrepresenting its privacy policies by sharing personally identifiable information with advertisers without first getting permission from users.
Which security concerns should institutions be bracing for, as more consumers adopt mobile banking? BITS offers a collection of recommendations from some of the industry's top institutions.
Which Internet security threats pose the greatest risks to organizations in 2012 and beyond? Symantec has just released its Internet Security Threat Report, which reveals some surprising trends.
Many organizations are expanding their application security teams as they accommodate the use of employee-owned devices in the workplace and build their own app stores.
Though not perfect, says House Cybersecurity Co-Chair Jim Langevin, D-R.I., "CISPA represents an important good-faith effort to come together as a necessary first step toward better cybersecurity for our nation."
Rep. Dan Lungren introduced an amendment to his onetime bipartisan cybersecurity bill that won only the backing of fellow Republicans with Democratic members of the House Homeland Security Committee objecting to the changes.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.