The Ashley Madison dating website hack and threatened data release is a perfect illustration of the perils - and promise - of our Internet-connected, hacktivist age, whether it comes to online dating or the Internet of Things.
Enterprises in APAC are prone to greater risks because of a lack of awareness about advanced threats, says BH Global CIO Ken Soh. He shares insights on how to prepare incident response teams to combat threats.
The U.S. Department of Justice has charged three men in a fraud scheme reportedly tied to hacks of JPMorgan Chase. Separately, two men are charged with running an unlicensed online bitcoin exchange used by Russian criminals.
DNS hijacking is the most common attack being investigated by Akamai's incident response team, says APAC CTO Mike Smith. He shares some background on the subject and his session on it at RSA Conference APAC.
Raimund Genes' keynote at RSA Conference Asia Pacific & Japan is an appeal to the information security community to start putting security in perspective, emphasizing new approaches that address the changing threat landscape.
Robin Slade of the Santa Fe Group says current vendor risk evaluation methods are inefficient. She advocates peer collaboration through shared assessments of vendors to help improve management of third-party risks.
Cybersecurity is the top priority of the new "Digital India" initiative. B J Srinath, who just took over as the director general of CERT-IN, says his agenda is to create a cybersecure ecosystem for all the key stakeholders.
The hack of "cheating" dating site AshleyMadison.com is a reminder that no website or personal information can be guaranteed to remain secure against determined attackers. So businesses and consumers must plan accordingly. Here are six takeaways from the incident.
The risks of e-commerce breaches are top-of-mind again with the news of a possible compromise of PNI Digital Media, which manages and hosts online photo services for numerous big-name retailers. How can the risks be mitigated?
British police have re-arrested Lauri Love, who's been charged with 2012 and 2013 hack attacks against U.S. government computers, including systems operated by the Federal Reserve, U.S. Army and NASA. But Love plans to fight extradition.
Antrix becomes the latest in a long line of government agencies that have been hacked or defaced. What lessons can be learned from this incident, and how must agencies improve their cybersecurity posture?
An international police operation has resulted in charges being filed against dozens of suspected cybercriminals, as well as the shuttering of the infamous hacking forum Darkode. But will the operation take a serious bite out of cybercrime?
Security researchers reported a zero-day bug to Microsoft - which has patched the flaw - after reverse-engineering details were contained in a bug hunter's sales pitch to hacked surveillance software vendor Hacking Team.
Consider for a moment the most vital operation in your enterprise. It might run financial processing around the world, control a city's electrical distribution, or handle
millions of passengers' airline reservations. What happens to your business if the computers directing such operations are hacked, sabotaged or...
Let's assume that your security operations are stellar. You have procedures in place to keep software patches up to date, and a team that responds to incidents within minutes. A relentless focus on security permeates your enterprise. In short, in-house you're doing everything right. But how about outside your...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.