An explanation of how the FBI likely was able to quickly review 650,000 emails found on a computer shared by a top aide to Democratic Party presidential nominee Hillary Clinton leads the latest ISMG Security Report. Also, this week's ISMG Fraud and Breach Prevention Summit in London is previewed.
U.K. Chancellor Philip Hammond used the launch of Britain's new five-year National Cyber Security Strategy to trumpet the country's strike-back capabilities. But other parts of the strategy - including more automated defenses - hold much greater promise.
The websites of seven of India's embassies apparently were hacked and some data pertaining to Indian citizens leaked online by the attackers claiming responsibility. The hackers say they wanted to call attention to the sites' vulnerabilities.
Scotland-based Tesco Bank has blocked all online transactions tied to customers' current accounts after money was stolen from 20,000 of those accounts and the bank detected suspicious activity involving another 20,000 accounts, according to CEO Benny Higgins.
I'm looking forward to this week in London, where Jason Tunn of the Metropolitan Police Service will walk us through a high-profile cybercrime investigation that resulted in the 2015 arrest of two British hackers with links to Russia after they attacked leading U.K. banks with the Dridex banking Trojan.
What are the critical elements of developing a "wartime" mindset to deal with serious cyber threats facing the healthcare sector? Find out how presenters and attendees answered this question at ISMG's Healthcare Security Summit.
Will the advent of faster payments in the U.S. open new doors for fraud? Business continuity and security are priorities for the Federal Reserve, says Marianne Crowe of the Boston Fed. But independent consultant Richard Party begs the question: Is the U.S. really ready?
India has just woken to a massive breach long anticipated by pragmatic observers in the industry. However, ironically, no responsibility can be pinned. Individual banks are all claiming innocence, and the regulator is MIA.
The latest ISMG Security Report features a special report on potential cyber threats that could damage the integrity of the U.S. presidential election. Also, an analysis of the harm caused by Australia's largest breach of personal information.
This year, the annual Black Hat Europe conference decamps from Amsterdam to London. What's in store? Everything from mobile ransomware and quantum-resistant crypto to "ego markets" and how to turn Belkin IoT devices into launch pads for DDoS attacks.
A potentially explosive story suggests that there were secret communications between Russia and U.S. presidential candidate Donald Trump's business. But computer security experts have dismissed the report, saying it's based on a flawed interpretation of technical information.
The Shadow Brokers - the group that released what are purported to be hacking tools tied to the NSA - returns with what it claims to be a list of exploit-staging servers used by the U.S. intelligence agency to stage its cyber-attack and surveillance operations.
Australia's largest-ever known data leak wasn't caused by hackers. Instead, a contractor mistakenly posted a database of blood donor information on a public website, showing how a simple mistake can have deep repercussions.
In light of the increase in ATM fraud in India, it's essential that banks more closely monitor the security efforts of third-party service providers they increasingly are relying on to help manage their networks, says Prakash Joshi, COO at Electronic Payment Systems
An evaluation of new U.S. government guidance to prevent the hacking of automotive computers and electronics leads the latest ISMG Security Report. Also, IBM takes responsibility for the impact of a DDoS attack and a preview of the ISMG Healthcare Security Summit.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.