The recent seven-day malvertising campaign that ran via Yahoo's ad network demonstrates not just the challenge of finding these attacks, but the difficulty of blocking or eradicating them.
"Defend everything" is not working. And as attacks get more sophisticated, attackers are innovating in ways that challenge organizations shackled by legacy security strategies, says FireEye's Bryce Boland.
News that charges were filed last week against two California residents for their alleged roles in the 2011 Michaels crafts stores breach, which involved terminal tampering, is a reminder of how much hackers have improved their techniques in just four years.
The toolbar distributed by Chinese-language search engine Baidu is being targeted by opportunistic attackers and used to exfiltrate corporate secrets, warns Rob Eggebrecht, president and CEO of the security firm InteliSecure.
The FBI says numerous financial services firms continue to face DDoS and stolen-data-dump threats from supposed hackers. Security experts say the only effective and sustainable defense is preparation - not payoffs.
An NSA map that shows nearly 700 cyber-assaults on computers at American military installations, government agencies, businesses and educational institutions raises the question of whether the e-spy agency should have shared some of that information.
Attributing the Anthem, OPM and other breaches to specific attackers might be useful for government-level diplomatic efforts. But organizations must prioritize blocking all types of espionage and cybercrime attacks, says Symantec's Vikram Thakur.
In the wake of the severe Stagefright flaw being discovered, numerous security-savvy experts say they now plan to ditch Android. Is it time for enterprises to start blocking unpatched Android devices?
The prices for stolen payment card data and other cybercrime products and services on Russian underground forums continue to fall. But the cybercrime ecosystem is more automated, effective and robust than ever, Trend Micro reports.
Akamai's John Ellis talks about the quick evolution of bots and botnets, and how enterprise security leaders should deal with them now using a three-pronged approach - detection, management and mitigation.
Just how prepared are Japanese entities for dealing with the risks from targeted attacks? What are the unique considerations and the maturity level? Trend Micro's Masayoshi Someya shares his perspective.
Just two weeks after an international, FBI-led operation disrupted the notorious hacking forum Darkode, leading to 70 arrests, a supposed site administrator has claimed the forum will reboot on the "dark Web." But security experts question those claims.
Gene Fay of Resilient Systems says the traditional method of solving risk issues through technologies no longer works. Instead, he says, security must be built on the foundation of an effective incident response plan.
If SSL goes away today, the Internet needs a security plan B, says Uniken's Chief Security Evangelist, Menny Barzilay. Innovation on the application level is what will restore trust, he believes.
Visa's Eduardo Perez says one of the key merchant vulnerabilities his company is most concerned about is weak remote-access controls for point-of-sale systems and devices. He offers risk mitigation advice in this exclusive interview.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.eu, you agree to our use of cookies.