Community banking institutions are at great risk of cyber-attack because they often don't think they're targeted, says Scott McGillivray of Pacific Continental Bank, who describes how to convey this risk to senior management.
More hackers are holding data for ransom, demanding everything from bitcoins to the shutdown of nuclear reactors, under the threat of leaking sensitive information. But it's not clear how many such attacks generate revenue for attackers.
Ransomware attacks are getting more agile, varied and widespread, and are increasingly taking aim at businesses of all sizes in all sectors, rather than consumers. That's why employee education is so critical.
Today's cyber world is an evolving landscape of known vulnerabilities and exploits coupled with new threats brought by new technologies. Security professionals must learn to protect their businesses from both.
The HP Cyber Risk Report 2015 brings the information you need to do that. This comprehensive study...
As a result of the explosive growth in worldwide use of smart phones, mobile malware will play a much bigger role in fraud this year, predicts Daniel Cohen, a threat researcher for RSA, which just released its 2014 Cybercrime Roundup report.
Adobe confirms that a zero-day flaw exists in its Flash browser plug-in and promises to soon release Windows, Mac and Linux fixes for affected versions of Flash Player. The vulnerability is reportedly already being targeted by in-the-wild attacks.
The Union Home ministry has formed a five-member panel to devise a roadmap to tackle cybercrime. But do the members have the experience necessary to fulfill the mission? Security experts express reservations.
As various batches of stolen credit card "dumps" are offered for sale with discount structures and money-back guarantees, it is clear just how sophisticated the Fraud Ecosystem has become. The fraudsters and their support teams have created well-organized forums offering a broad variety of products that constitute a...
Intelligence is critical in mounting an effective defense and, equally as important, is an effective offense. This session will look at intelligence gathering from both sides of the DMZ. There is a great deal of critical information available about your adversaries and a startling amount about you, your organization,...
For virtualization security, there's no one size fits all solution...and trying to fit your organization's specific needs into the wrong security product can be a costly mistake. Do you know how to pick the right option for your organization?
A new whitepaper from Kaspersky Lab, Virtualization Security Options:...
Except for the leak of celebrities' private data, the "wiper" malware attack against Sony Pictures Entertainment shares "extraordinary" similarities with previous wiper attacks in Saudi Arabia and South Korea, a security researcher finds.
Citadel financial malware has been upgraded to steal master passwords for software designed to securely store lists of usernames and passwords, according to IBM's Trusteer unit. Security experts offer insights on how to respond to the threat.