The section chief of the FBI's Cyber Division says "the FBI does not condone payment of ransom," in part because it enables criminals to victimize others. Instead, the bureau continues to urge all potential victims to get their IT house in order.
Following the theft of $81 million from Bangladesh Bank, is it time for banks to make SWIFT money transfers less automated and better supervised and thus secure? An alleged scam from the days of telex machines and code books offers useful perspective.
Defending the network against cybersecurity threats has become nearly impossible with traditional tools. The number of malware families continues to increase, the threats are more advanced, and the IT environment is more complex. What's more, due to a greater reliance on the network, a service outage, data breach or...
Just six months after law enforcement agencies coordinated a takedown to disrupt online banking credential theft linked to the banking Trojan Dridex, the malware has re-emerged with new attack tactics and new targets, researchers say. U.S. bank accounts and businesses are now primary targets.
The Joint Commission, which accredits healthcare organizations, has reversed its long ban on physicians and other clinicians using text messaging to place orders related to patient care, citing technology advances that enable more secure communication. But users must comply with a list of requirements.
Within the next 20 years, quantum computing could be applied to easily crack current approaches to cryptography, according to the National Institute of Standards and Technology, which already is beginning work on new approaches to encryption that can withstand the power of quantum computing.
Most enterprise IT professionals agree, securing the network only at the perimeter is inadequate for today's data centers. Modern attacks can exploit a perimeter-centric defense. In this paper, we show how VMware NSX enables security that is both ubiquitous and granular by integrating security functions into the...
This brief explains why it's time to take the next step toward the software-defined data center, and apply network virtualization and micro-segmentation to the network. It empowers infrastructure architects to react quickly to prevent breaches.
Build a fundamentally more agile, efficient and secure application...
This handy guide highlights some of the key benefits of securing your data center from within using micro-segmentation. Get started now.
Build a fundamentally more agile, efficient and secure application environment with VMware NSX network virtualization featuring Intel® Xeon® processors and Intel® Ethernet...
Discover how micro-segmentation, delivered through network virtualization, provides comprehensive data center security, accelerates delivery time, and enhances the agility of your data center. Download the eBook here.
Build a fundamentally more agile, efficient and secure application environment with VMware NSX...
The Verizon 2016 Data Breach Investigations report finds malware, ransomware and phishing attacks are more common than ever and creating even more damage. Organizations are continuing to get exploited via vulnerabilities that are months or even years old, forensics expert Laurance Dine explains in this interview.
Only 23 percent of surveyed organizations can respond effectively to a cybersecurity incident. This is among the findings of Solutionary's fourth annual Global Threat Intelligence Report. "When malware authors are out there creating malware to do its mission, the first mission of the malware is to do what? It's to...
Vladimir Tsastin, an Estonian national, has been sentenced to serve more than seven years in prison and pay a $2.5 million fine after pleading guilty to running a $14 million click-fraud scheme with more than 4 million victims across 100 countries.
Five new payment card data security requirements for third-party service providers are among the most significant changes included in version 3.2 of the PCI Data Security Standard released April 28, says Troy Leach of the PCI Security Standards Council.
Despite the arrest and conviction of scores of cyber criminals - including members of the Blackhole exploit kit, SpyEye and GameOver Zeus crews - malware and ransomware threats continue to grow.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.