When it comes to enabling digital transformation, financial institutions do not just compete with rival institutions; they compete with the latest, greatest website or mobile app their customers have used. As a result, financial institutions face increasing pressure from their digital customers to embrace...
With automation and the increasing economic feasibility of launching targeted attacks on a small scale, tier-II and III organizations housing data need to start getting concerned, says Gartner's Ahlm.
International law enforcement agencies are warning banking institutions and businesses about extortion attacks being waged by an entity known as DD4BC, or DDoS for Bitcoin. They're advising organizations not pay any ransom and to notify their ISPs and law enforcement officials of any threats.
Lizard Squad, which markets the Lizard Stresser distributed denial-of-service attack tool, appears to have targeted the public-facing website of the U.K.'s National Crime Agency in retaliation for its recent DDoS-tool crackdown.
Extortionists and "free agent" rogue insiders have emerged as the top two most malicious cybercrime threats to banking institutions, says Gartner's Avivah Litan. How should institutions bolster their defenses?
The FBI says numerous financial services firms continue to face DDoS and stolen-data-dump threats from supposed hackers. Security experts say the only effective and sustainable defense is preparation - not payoffs.
The Indian Computer Emergency Response Team released an alert in response to the spread of a new family of Trojan malware dubbed 'Golroted'. How can enterprise IT and individual systems be secured?
The prices for stolen payment card data and other cybercrime products and services on Russian underground forums continue to fall. But the cybercrime ecosystem is more automated, effective and robust than ever, Trend Micro reports.
Akamai's John Ellis talks about the quick evolution of bots and botnets, and how enterprise security leaders should deal with them now using a three-pronged approach - detection, management and mitigation.
Just how prepared are Japanese entities for dealing with the risks from targeted attacks? What are the unique considerations and the maturity level? Trend Micro's Masayoshi Someya shares his perspective.
Tools to build and manage the ZeusVM banking Trojan have been leaked online, meaning that both die-hard and would-be criminals alike can now try their hand at running botnets, for free.
Is it wrong that accused Lizard Squad hacker Julius Kivimaki, a teenager who was convicted of 50,700 "instances of aggravated computer break-ins" attacks, gets to walk away without having to serve any jail time?
A "deliberate" denial-of-service attack against state-owned LOT Polish Airlines resulted in ground crews being unable to generate flight plans. The airline now says its systems were not hacked, but rather disrupted, and that all airlines face similar risks.
Fortinet's annual Security Census 2015 reports that APJ CISOs faced major vulnerabilities in 2015 via unsecured wireless networks. Experts advise on protection methods for wireless networks.
Wipro has developed a fraud detection model for improved risk management using big data analytics. Can CISOs leverage it to reduce risk, enhance process efficiency and refine fraud detection algorithms?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.