Cybercriminals broke into the payment card processing system used by the Madison Square Garden Co., owner of Radio City Music Hall and other iconic entertainment venues, harvesting payment card details for nearly a year.
European banks have seen a new wave of ATM jackpotting attacks, where machines are commanded by malware to spit cash into the waiting hands of criminals, according to a new report. But why is this report being cautiously received?
Phishing attacks arguably are the most persistent-and pernicious-cyberattacks that organizations face. They have grown to be more targeted and dangerous, as the variety of attack methods continue to evolve and the number of threat actors proliferate.
Styles of phishing continue to metamorphose from scattershot...
Security vendor Symantec plans to integrate identity theft protection services into its product offerings with its just-announced $2.3 billion pending acquisition of LifeLock, which has 4.4 million customers.
Opportunistic and highly profitable, digital hostage-taking using ransomware is now rapidly developing into a favorite technique of the strategic, enterprise-focused attacker. For a variety of end goals, be it hacktivism, nation-state revenge or financial gain, the methodology is simple. Quite often the first you'll...
The financial sector continues to be a prime target for highly sophisticated, customized attacks. The SWIFT money transfer system recently came under attack resulting in an $81 million heist of the Bangladesh Bank. This number pales in comparison to an estimated $1 billion stolen from over 100 banks worldwide by the...
Three Mobile, one of the largest U.K. mobile providers, saw more than 132,000 accounts breached in a scam in which fraudsters ordered new devices for customers and then tried to intercept the deliveries.
Cloud-based services can be both a "blessing and curse" when it comes to dealing with security, says John Houston, CISO and associate counsel for the University of Pittsburgh Medical Center, who explains why in this video interview.
To combat breaches involving insiders, organizations need to limit employees' access to data and more closely monitor access activity, security expert David Gibson of Varonis says in this video interview.
Highlighting the latest ISMG Security Report: National Institute of Standards and Technology's Ron Ross explains how a new approach employing engineering principles can be used to build secure, trustworthy systems. Also, when a ransomware attack is deemed a breach.
Did you know that Ransomware was cited as the leading attack by 55% of respondents in the 2016 SANS Financial Services Survey? On the other hand, ransomware is the second most common attack, reported in the 2016 SANS Healthcare Survey. Rather than dying, antivirus is actually growing up. Today, organizations look to...
In today's global transaction environment, new fraud schemes are launched on a daily basis, and can gain momentum with alarming speed. Fraud management solutions must be agile, to respond quickly, and comprehensive, to fight fraud across the entire financial enterprise.
Download the whitepaper to learn how:
One...
Across industries, organizations rely on the FICO® Falcon® Platform to deliver end-to-end fraud, security and compliance management. This enterprise-class decisioning solution features an open, extensible architecture, giving your institution the flexibility to easily expand its fraud management environments. You...
Shazam says it plans to update its music application for Mac after a researcher found it leaves a computer's microphone on when users have attempted to turn it off.
An analysis of how the Donald Trump administration will address health IT security and privacy leads the latest edition of the ISMG Security Report. Also, the ramifications of a big breach, and an FBI agent tackles ransomware.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.eu, you agree to our use of cookies.