A Reuters report claiming executives at SWIFT for years neglected the security of its messaging system has stirred debate among security and anti-fraud experts. Who should take the lead role for security of bank-to-bank transactions - SWIFT or its member banks?
Agari's John Wilson doesn't just fight email fraud schemes - he also is the occasional target. What have the fraudsters inadvertently taught him about their latest tactics? And how can these lessons help organizations to improve their defenses? Find out in this video interview.
USB devices and ports pose serious risks, and they aren't going away anytime soon. But researchers say they've developed a way to block malicious actions by USB devices to help prevent attacks such as "BadUSB."
Retailer Eddie Bauer is warning customers that their payment card data may have been compromised by point-of-sale malware during a six-month attack. The warning follows HEI Hotels & Resorts disclosing a 15-month malware attack affecting 20 locations.
Police have arrested an employee of U.K.-based accountancy and business software developer Sage Group after a data breach. Meanwhile, a report has emerged that some customers are using its software in an unsecured manner.
Organizations are increasingly centralizing their fraud programs. Why? To reap the benefits of having a unified fraud management team and a single strategy to detect and prevent fraud, says Genevieve Gimbert, a principal in PwC's financial crimes unit, in this video interview.
Banks need to develop customer authentication strategies that meet demand for strong security as well as convenience, says Mary Ann Miller of NICE Actimize, who describes emerging multifactor approaches in this video interview.
Cybercriminals wielding Locky crypto-locking ransomware are ramping up their assaults, especially in the healthcare sector, according to FireEye. Attackers are distributing less banking malware and more ransomware, researchers say.
The Equation Group leak revealed a zero-day flaw in Cisco's firewall software - a patch is being prepped - as well as a vulnerability in Fortinet's software that's since been patched. Has the U.S. government long known about the flaws?
Scant doubt remains that a set of code and exploits - leaked by the "Shadow Brokers" hacking group - belongs to the Equation Group. What remains unclear, however, is who leaked the code and why.
Is the recent breach at HEI Hotels & Resorts linked to the hack of POS systems provider MICROS? And have other POS vendors been breached as well? Security experts offer their analysis and size up vendor vulnerabilities.
Cerber ransomware victims often see a ransom note demanding 1 bitcoin in exchange for a decoder. For what's sure to be a limited time, however, victims can take advantage of a new, free decoder.
In today's environment, federal and state regulators come at breached companies from all angles, with requests for investigative information, breach response plans and fines. Attorney Deborah Gersh explains why so many agencies stake their claims in breach response.
Australia's census debacle has prompted questions over whether main contractor IBM made errors, and if the Australian Bureau of Statistics underestimated the resources it needed to successfully power a busy, online service.
To facilitate faster decision-making, better cost control and increased transparency, many organizations now task a single executive to oversee all security, privacy and risk functions, says ADP's Roland Cloutier.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.