College student Zachary Shames, who's pleaded guilty to developing and selling Limitless Logger spyware, was outed to the FBI by security firm Trend Micro after Shames failed to compartmentalize his online activities. Turns out hiding your identity online is harder than it might appear.
Information security researchers have charted a steep decline in Locky ransomware and Dridex banking Trojan distribution in recent weeks. While that's good news, it may only reflect that a cybercrime gang is on vacation.
How important is mobile? For most businesses, mobile represents a highly profitable channel, and one that is critical in attracting new customers, especially the millennial generation.
Where there is growth, there is fraud. The rise of advanced, PC-grade mobile malware, innovative fraud schemes, such as SIM swap...
In today's fast-paced world, the expectation often is that everything happens instantaneously. Consider banking, where customers typically expect immediate action on payment transactions and funds transfers from their accounts.
In many countries including the UK, Singapore, Nigeria, Poland, Mexico and Sweden,...
Over the past three decades, we have witnessed great technological changes in the financial services world and we've seen regulators struggle to keep up with them. For example, electronic payment service
providers such as PayPal (later acquired by eBay) took on the challenge of facilitating global online payments....
Mistakes happen, and given the frequency that we click the 'Send' button, it's no surprise that they happen often in email. Whether it's adding the wrong recipient, attaching the wrong file or trusting the wrong person, sensitive data is inappropriately leaving your organization in email. Implementing an email data...
In a reminder that healthcare organizations continue to be targeted by more than just crypto-locking extortionists, a cyberattack against an NHS trust didn't involve ransomware - as some initial reports suggested - but rather a never-before-seen Trojan.
Malware designed to get ATMs to spit out their cash - advanced when it first debuted - has been upgraded, according to a report from FireEye. Now, the Ploutus-D malware talks to legitimate ATM middleware, enabling it to target machines from 40 vendors. What does this mean for financial institutions?
A researcher claims WhatsApp has dismissed his finding that there's a backdoor in the application that could allow attackers to unlock encrypted messages. But the controversy is more nuanced - and for most of us, much less threatening - than it might first appear.
Yet another study reveals that millions of people are picking weak passwords, with "123456" remaining our collective favorite. Rules requiring stronger passwords and not forcing passwords to expire both could help boost security.
VMware Workspace ONE brings together the power of VMware AirWatch® and VMware Identity Manager to accelerate and secure Office 365 deployments. In this
white paper we'll explore how you can address above challenges with Workspace ONE, and enable the secure use of Office 365 across corporate-owned devices,
personal...
Yet another power blackout in Ukraine was the result of attackers striking via spear-phishing emails and malware, researchers have confirmed. Ukraine's president blamed the campaign on Russia and said it disrupted a number of critical infrastructure targets.
A list of "super user" passwords - and a default username - now circulating online appears to allow unauthorized access to some webcam video streams, security researchers warn. If confirmed, it would be yet another massive internet of things security failure by a device manufacturer.
In the world of endpoint security and antivirus, there is a need to shift away from using signatures as the primary method for malware prevention. No less than 37 new endpoint security products have emerged in the past five years, each claimed to address the changing landscape. But how do you know who to use, when to...
The endpoint security market is continuously growing as many customers find endpoint security suites to be effective in tackling their top security concerns. However, the market is now very fragmented with vendors approaching endpoint security in different ways.
Download this whitepaper to find out the best leader...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.