Today's targeted threats are often multi-vectored and exploit unknown vulnerabilities - their sophistication defying typical signature-only based inspection. Whether APTs or client-side threats, they use evasive techniques to penetrate our organizations, often purporting to be or riding on applications and exploiting...
DDoS attacks against U.S. banking institutions have exposed website vulnerabilities organizations have failed to address, says Jason Malo of CEB TowerGroup. Here, Malo offers defense strategies.
A self-proclaimed member of the hacktivist group Izz ad-Din al-Qassam Cyber Fighters says Iran is not backing DDoS attacks against leading U.S. banks. What else did he reveal about the DDoS attacks?
Organizations everywhere should be concerned about DDoS attacks. But most are too focused on compliance to pay enough attention to fraud and security fundamentals, says ENISA's John Walker.
As banking institutions await a new wave of DDoS attacks, one security vendor says it foresaw one rare -but effective - element of these attacks as far back as 2006. What can banks expect to see next?
Regions Bank is the eighth U.S. financial institution apparently targeted by a DDoS attack believed to be waged by the hacktivist group Izz ad-Din al-Qassam. Experts say banks should brace for more attacks on the way.
The hacktivist group known as Izz ad-Din al-Qassam apparently made good on its promise to take down Capital One's online presence. So what does this latest in a series of DDoS attacks mean for other banks?
Major European institutions are not prepared to prevent or respond to online attacks such as those reportedly hitting U.S. institutions, according to fraud and security experts at ENISA and Barclays.
Breaches of online accounts prove organizations need to focus more on password protection. But Araxid's Brent Williams says enhancing password security doesn't have to be rocket science.
The National Institute of Standards and Technology says intrusion detection and prevention software has become a necessary addition to the IT security infrastructure of many organizations.
The number of IT security job postings is up 60 percent this year on technology job board Dice.com. What are the top five most in-demand security skills, and what do these jobs currently pay?
"Without combining relevant data sets impacting the network, security professionals will fail in characterizing threats and targeted intruder activity," says Ed Stoner, a senior Carnegie Mellon researcher.
Hacktivist attacks are on the rise. So how should organizations respond? ISF researcher Gregory Nowak offers unique advice about the role communications plays when hacktivist threats emerge.
The FTC claims hackers targeted the Wyndham hotel chain's network and exported debit and credit data to a domain in Russia. What do the breaches mean for card issuers, and what action should they take?
Marcus Ranum isn't shy about saying online authentication methods are outdated and insecure. Passwords will get breached, but organizations can do more to protect their users and online databases.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.