Businesses around the world are seeing an increase in malware attacks, including ransomware like CryptoLocker, Locky, and zCrypt. These attacks can result in weeks of downtime, and some of the most damaging data breaches originated with malware, including the Target breach in 2014.
A robust malware defense could...
The government of India is taking the data protection and privacy bull by the horns, gunning for comprehensive data protection legislation within the next 5 months. Experts offer an analysis of what the nation needs.
A lack of computer security professionals in Australia made recruiting difficult. But new changes to immigration rules may really pinch the country's nascent cybersecurity industry.
To shift from reactive to active defense mode, organizations need to get better at both threat-hunting and incident response. Too many organizations simply lack an incident response plan before they need one, according to Tim Bandos, Senior Director of Cybersecurity at Digital Guardian.
Download this interview...
In the wake of fraud reports, Blowout Cards has issued a security alert to customers, warning that an attacker hacked its website and installed a PHP file designed to skim payment card details at the time of purchase.
Word that President Donald Trump's cybersecurity executive order could be unveiled in days leads the latest edition of the ISMG Security Report. Also, large Australian companies anticipate rise in information security risk.
Phishing and ransomware are increasing at the rate of several hundred percent per quarter, a trend that Osterman Research believes will continue for at least the next 18 to 24 months. However, organizations can address the threat through a variety of means: user education, security solutions, vulnerability analysis,...
Phishing and ransomware are increasing at the rate of several hundred percent per quarter, a trend that Osterman Research believes will continue for at least the next 18 to 24 months. However, organizations can address the threat through a variety of means: user education, security solutions, vulnerability analysis,...
The best approach to building a security policy is by using a comprehensive, layered approach that covers all threats (both new and known). This policy needs to leverage real-time threat intelligence by addressing all threat vectors and all platform types as workloads migrate from physical to virtual to...
When an employee exits, it's essential to ensure their access rights don't go with them. Too often, however, organizations fail to track who's joining, leaving or changing roles, leaving them at increased risk of malicious activity.
President Donald Trump last week failed to meet a self-imposed, 90-day deadline to issue a report on "hacking defenses." But let's not nit-pick. After all, cybersecurity is complex - something the president is likely discovering along with healthcare and tax reform.
The European Banking Authority (EBA) recently published its long-awaited final draft of the Regulatory Technical Standards (RTS) on Strong Customer Authentication (SCA) and Common and Secure Communication (CSC) under the revised Payment Services Directive (PSD2).
Download this whitepaper to learn:
Background...
Download this eBook to discover:
The latest social engineering attack methods
The transaction authorization weaknesses
How to minimize the risk of social engineering attacks
Industry best practices and use cases
The vast majority of people today rely on mobile devices everywhere they go, and they expect their phones to accomplish just about everything... including fully enabled banking services. But as common as they are, mobile phones are still perceived by many as relatively insecure. Hacks happen, and the vulnerability of...
Unlike desktop applications, mobile apps are harder to secure because they are often written with no built-in security. Delivering mobile apps that are secure and usable increasingly requires invisible technologies like RASP (runtime application self-protection) which assesses the integrity of the mobile app, and...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.