Bitcoin's massive rise in value and hype continues to draw the attention of hackers, scammers and organized crime. Flaws in bitcoin mining firmware and hacks of wallet software show that the infrastructure associated with cryptocurrency is not always well-secured.
Cybercriminals continue to rely on individuals who undertake the risky operation of moving illicit proceeds from one location to another. But these "money mules" face a multitude of risks, including imprisonment, police warn.
In an era where users are working simultaneously across mobile, social and cloud applications and platforms, organizations need to deploy identity and access management solutions that can scale and adapt quickly. IBM's Sean Brown describes the rise of Identity as a Service.
Are unpatched vulnerabilities leaving you at risk?
At the rate of almost half of all attack types, hackers are using injection attacks to take advantage of vulnerabilities in operating systems and applications to penetrate networks and databases.
Download this whitepaper and learn:
How attackers are using...
With both money and personal information at stake, financial services organizations continue to be a magnet for cybercrime.
Download this whitepaper and learn about:
Notable attacks against financial institutions in 2016;
Prevalent methods of attack utulized by cybercriminals;
Best practices for banks to...
Denial of Service, web application layer attacks, credential abuse and IoT - these are the attack trends and vectors that will make headlines in 2018. Ryan Barnett of Akamai offers insight into how to prepare your defenses.
If you want to anticipate a prospective hacker's moves, then you'd better be able to think like one. That's the position of Terry Cutler, an ethical hacker who dedicates his time to testing organization's cybersecurity defenses - and their people.
A report on the SEC targeting a Canadian company for fraud, alleging it cheated investors by exploiting a so-called Initial Coin Offering crowdsourcing funding system, leads the ISMG Security Report. Also, an NSA analyst pleads guilty in a case involving storing classified data on his home PC.
As data breaches increase in scale and frequency, businesses must ensure an effective, swift and well-orchestrated response. To help them, ISMG on Wednesday and Thursday will host a Fraud and Breach Prevention Summit in Mumbai offering insights from 20 leading CISOs and many other experts.
For hackers, phishing is easy. And profitable. The average phishing attack costs a mid-sized company $1.6 million. No wonder the number of phishing attacks shot up 65% worldwide last year.
For many years, organizations have invested in technology to keep them safe from malicious emails. Yet ransomware, CEO...
This monthly Security Agenda will highlight some of the most recent additions to our course library. This month's edition features New York Presbyterian's Jennings Aske on getting serious about medical device security. Another influencer, John Gunn of VASCO discusses the ISMG Faces of Fraud 2017: Survey Analysis and...
There has been a global rise in incidents of omnichannel financial fraud; such as a phishing attack being used to collect account information, then using that data to commit fraud via a bank's call center globally. Financial institutions need to enhance their ability to detect this sort of fraud - while also reducing...
Detecting new fraudulent online banking sites is only half the battle. Once identified, how do you prevent your end users from inputting their login credentials onto the site?
Download this whitepaper and learn:
Why traditional approaches do not shut down phishing sites in time;
How new approaches continuously...
A sustainable fraud protection system that addresses the evolving threat landscape and helps banks confirm user digital identities requires three fundamental features.
Download this whitepaper and learn how your financial institution can prevent fraud with:
Global threat intelligence;
Expert research and...